Table 2.
The role of each module.
Serial number | Name | Composition | Effect |
---|---|---|---|
1 | Perception layer | Wireless sensor | It is a part of the bottom layer, which controls physical security and is used to ensure the integrity of IoT information collection data and not be destroyed or stolen. |
2 | Information collection layer | Information collector | Its information security needs to be managed to prevent the data collection process from being used and controlled, and the technology of the perception layer is encrypted with key management and chip design. |
3 | Information transmission security layer | Hard disk | Data transmission ensures the smooth collection of data and cooperates with security management technologies, such as wireless network security, routing security, firewall, and virtual network technology. |
4 | Information processing layer | Hard disk | It is to ensure the security of information processing and storage. It is composed of cloud storage and security management. Its technologies include analysis of security data, viruses, monitoring data, and data mining results. |