STEMM Institute Press
Science, Technology, Engineering, Management and Medicine
Industrial Internet Security Protection Strategy Based on the Blockchain
DOI: https://doi.org/10.62517/jiem.202403111
Author(s)
Hua Sun, Jiale Wu*, Yirang Yin
Affiliation(s)
Industrial Information Security (Sichuan) Innovation Center Co., Ltd (ICICS), Chengdu, Sichuan, China *Corresponding Author
Abstract
With the rapid development and wide application, the industrial Internet integrates a large number of industrial equipment and systems, and involves massive data exchange and processing, which brings security risks such as data leakage, illegal access and system attacks, while improving the production efficiency. The blockchain technology can provide a secure and reliable network environment with its unique decentralization characteristics, data immutability and high transparency. Therefore, based on the blockchain technology, this paper discusses the security protection strategy of industrial Internet, in order to provide theoretical references for the healthy development of industrial Internet.
Keywords
Blockchain; Industrial Internet; Safety Protection
References
[1] CHEN Dapeng. Research on Identity Analysis System of Industrial Internet Based on Blockchain [J]. Intelligent Computers and Applications, 2019,14(03):218-222. [2] YANG Jing. Research on Optimal Allocation of Industrial Internet Resources by Integrating Edge Computing and Blockchain [J]. Network security and Informatization,2024,(2):71-73. [3] XIANG Yanjie, ZhANG Huan. Research on Blockchain Distributed Identity Authentication Model for Internet of Things [J]. Wireless Internet Technology,2024,21(1):118-121. [4]Liu Y D,Hua Y H,Chen Q R. Research on Key Technologies of Data Security and Privacy Protection in Internet of Things Group Intelligence[J]. Optical and Quantum Electronics , 2024(56).
Copyright @ 2020-2035 STEMM Institute Press All Rights Reserved