Paper
27 September 2022 A design of high-speed railway internet of things security architecture
Peng Sun, Zhida Guo
Author Affiliations +
Proceedings Volume 12345, International Conference on Applied Statistics, Computational Mathematics, and Software Engineering (ASCMSE 2022); 1234513 (2022) https://doi.org/10.1117/12.2650103
Event: 2022 International Conference on Applied Statistics, Computational Mathematics, and Software Engineering (ASCMSE 2022), 2022, Qingdao, China
Abstract
The integration of high-speed railway Internet of things(IoT) and it industry is deepening, new technologies emerge in endlessly, and security threats are also increasing. This paper introduces in detail the four threats to the equipment, data, network and application security of the high-speed railway IoT, summarizes the security characteristics of the high-speed railway IoT, puts forward the necessity of building a comprehensive security protection system covering the "Cloud, Management and Terminals" of the high-speed railway IoT, and finally designs a comprehensive security protection system of the "Cloud, Management and Terminals" of the high-speed railway Internet of things. This paper focuses on the comprehensive security protection system of "Cloud, Management and Terminals" of high-speed railway Internet of things, makes up for the lack of traditional railway IoT security protection system, and puts forward corresponding security protection strategies according to the main security threats of each security partition of high-speed railway IoT, so as to provide more thinking and direction for the security research in the field of high-speed railway IoT.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Peng Sun and Zhida Guo "A design of high-speed railway internet of things security architecture", Proc. SPIE 12345, International Conference on Applied Statistics, Computational Mathematics, and Software Engineering (ASCMSE 2022), 1234513 (27 September 2022); https://doi.org/10.1117/12.2650103
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Computer security

Information security

Clouds

Internet

Data processing

Security technologies

RELATED CONTENT


Back to Top