期刊文献+

基于非对称加密算法的农业物联网数据加密解密模块的研究 被引量:7

Research on Agricultural Internet of Things Data Encryption and Decryption Module Based on Asymmetric Encryption Algorithm
下载PDF
导出
摘要 随着我国农业信息化的高速发展,越来越多的传统农业企业开始转型,大力发展农业物联网(Internet of Things,IoT)。而如何保障农业物联网在传输层的信息安全,是产业转型面临的严峻挑战。为了保障农业数据在传输过程中的安全,提出非对称加密算法对数据进行加密解密,详细概述了加密解密模块建设的原理和实现方法,为数据安全提供了有效的保护手段。 With development of agricultural informatization in China,more and more traditional agricultural enterprises have begun to transform and develop the Internet of Things(IoT).However,how to ensure the security of agricultural information in the transmission layer is a serious challenge.In order to ensure the security of agricultural data in the transmission process,this paper proposes the use of asymmetric algorithm to encrypt and decrypt the data,describes in detail the principle and implementation of the encryption and decryption module construction,provides an effective means for data security protection.
作者 曹梦川 伍丹 杜朋轩 CAO Mengchuan;WU Dan;DU Pengxuan(Ningxia Polytechnic,Yinchuan Ningxia 750021,China)
出处 《信息与电脑》 2022年第15期224-228,共5页 Information & Computer
基金 智慧枸杞园关键技术集成创新示范及采收机械配套研究课题4“大数据在智慧庄园下的应用”(项目编号:2021BEF02001)。
关键词 农业物联网(IoT) 非对称加密 信息安全 数据处理 agricultural Internet of Things(IoT) asymmetric encryption information security data processing
  • 相关文献

参考文献8

二级参考文献46

  • 1魏秀岭,吕建新,杜传祥,雷旭,袁媛.基于三素数改进RSA算法的智能小区数据信息保护研究[J].冶金管理,2020(15):22-23. 被引量:1
  • 2吴晶晶.数据加密技术在计算机网络安全中的应用分析[J].计算机产品与流通,2020,0(6):41-41. 被引量:12
  • 3Archila J F, De Castro S Z, Becker M. Technical Feasibility and Conceptual Design Applied to a Robotic Platform Embedded Sensing System Used in Precision Agriculture Engineering[C]// 22nd International Congress of Mechanical Engineering (COBEM 2013). Ribeirao Prelo, SP, Brazil, 2013 : 1,117 1:127.
  • 4Liu Jian-qi, Wang Qin-ruo, Wan Jia-fu, et al. Towards Key Is- sues of Disaster Aid based on Wireless Body Area Networks [J]. KSII Transactions on Internet Information Systems, 2013,7(5) : 1014-1035.
  • 5Ji Sai,Sun Ya-jie,Shen Jian. A Method of Data Recovery Based on Compressive Sensing in Wireless Structural Health Monito- ring[J]. Mathematical Problems in Engineering, 2014,2014( 1): 1-9.
  • 6De Souza Evandro, Nikolaidis Ioanis. An exploration of aggrega- tion convergecast scheduling[J]. Ad hoc Networks, 2013, 11 (8) : 2391-2407.
  • 7Liu An, Ning Peng, Wang Chun. Lightweight remote imagemanagement for secure code dissemination in wireless sensor networks[C]//IEEE the 28th Conference on Computer Commu- nications. Rio de Janeiro, Brazil, 2009 : 1242-1250.
  • 8Weatherspoon H, Kubiatowicz J D. Erasure coding vs. replica- tion:A quantitative comparison [C]//Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS 2002). MIT Faculty Club, Cambridge, MA, USA, 2002 : 328-337.
  • 9Gu Ren tao, Zhang Lin, Ji Yue-feng. Secure and efficient metro- access network using network coding[C]//2011 International Conference on Information Photonics and Optical Communica- tions (IPOC). Jurong West,2011 : 1-4.
  • 10Boykov Y, Kolmogorov V. An experimental comparison of min- cut/max-flow algorithms for energy minimization in vision[J]. IEEE Transactions on Pattern Analysis and Machine Intelli- gence, 2004,26(9) : 1124-1137.

共引文献33

同被引文献48

引证文献7

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部