Paper
16 March 2023 IoT security access gateway authentication design
Zhouzhou Wu, Weiwei Qin, Qiqi Lu, LongKun Wei, Long Wang
Author Affiliations +
Proceedings Volume 12593, Second Guangdong-Hong Kong-Macao Greater Bay Area Artificial Intelligence and Big Data Forum (AIBDF 2022); 125931O (2023) https://doi.org/10.1117/12.2671841
Event: 2nd Guangdong-Hong Kong-Macao Greater Bay Area Artificial Intelligence and Big Data Forum (AIBDF 2022), 2022, Guangzhou, China
Abstract
There are many security risks in the data exchange of the Internet of Things. Therefore, this paper effectively integrates various technologies to design IoT security access gateway authentication to ensure the secure operation of IoT. The IoT gateway authentication hardware is divided into data collection, processing, access and power supply management modules to improve the security of IoT authentication and the efficiency of data processing. In the software design, the terminal device access identity authentication is realized through the communication protocol, and the identity authentication technology is analyzed to strengthen the security awareness of the network nodes. Test experiments show that in the face of different network problems, it can play a role in ensuring network security access and achieve more convenient, smarter, and more autonomous management.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhouzhou Wu, Weiwei Qin, Qiqi Lu, LongKun Wei, and Long Wang "IoT security access gateway authentication design", Proc. SPIE 12593, Second Guangdong-Hong Kong-Macao Greater Bay Area Artificial Intelligence and Big Data Forum (AIBDF 2022), 125931O (16 March 2023); https://doi.org/10.1117/12.2671841
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Computer security

Internet of things

Data storage

Design and modelling

Telecommunications

Data communications

Back to Top