LISS 2014 pp 1695-1701 | Cite as

Data Encryption and Transmission Technology for Cotton of IoT Security

  • Xiaodong Zhao
  • Lin Qi
  • Yajing Li
  • Junxia Chen
  • Huanhuan Shen
Conference paper

Abstract

IoT is a double-edged sword, it brings convenience to the control system, but also brings some security problems to be solved (Yang, Research on Key Technology of Control Security in IOT. Beijing University of Posts and Telecommunications. Beijing, 2013).This article describes the research on information data in cotton warehouse environment in terms of the security of IoT transmission. Through the analysis and research about data encryption algorithm and a virtual private network technology (Virtual Private Network, VPN), using data encryption technology and VPN technology combined, it is to study a scheme that send the local information of country’s cotton warehouse and data to the central control center secure transmission. This will not only ensure that data will not be a attacked or tampered by a third-party during transmission, but also have important significance for modern management of cotton warehouse.

Keywords

Information security of IoT Data encryption VPN Secure transmission 

Notes

Acknowledgements

Project Support: Cotton storage environment monitoring information of remote acquisition, storage and display system (National science and technology support plan) (2012BAH20B030-4).

References

  1. Hellman ME (1979) DES will be totally insecure within ten years. IEEE Spectr 16(7):32–39CrossRefGoogle Scholar
  2. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public key cryptosystems. Commun ACM 21(2):120–126CrossRefGoogle Scholar
  3. Wang J (2006) Research of RSA encryption algorithm. Shenyang University of Industry, ShenyangGoogle Scholar
  4. Wang Y (2012) Research on key technologies of information transmission for iot control system. Northeast Forestry University, HarbinGoogle Scholar
  5. Xia S (2011) Research on data security transmission technology based on DES and RSA encryption algorithm. Manuf Autom 1(2):180–182Google Scholar
  6. Yang J (2013) Research on key technology of control security in IOT. Beijing University of Posts and Telecommunications, BeijingGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  • Xiaodong Zhao
    • 1
  • Lin Qi
    • 1
  • Yajing Li
    • 1
  • Junxia Chen
    • 2
  • Huanhuan Shen
    • 2
  1. 1.Institute of Information Science and EngineeringHebei University of Science and TechnologyShijiazhuangChina
  2. 2.Institute of Economics and ManagementHebei University of Science and TechnologyShijiazhuangChina

Personalised recommendations