Trusted Computing and Privacy Protection Method for Computer IoT Nodes Based on Fuzzy Logic Blockchain
【Author】 Zhong, Beixin; Yang, Zilong; Liu, Zhonghao; Chen, Xiaoyong; Cheng, Shi
【Source】MATHEMATICAL PROBLEMS IN ENGINEERING
【影响因子】1.430
【Abstract】With the continuous growth of the social economy, the trusted computing and privacy protection methods of IoT nodes are constantly innovating and changing, from the traditional single IoT node protection method to the new interactive IoT nodes supplemented by various network resources. That is, the item information server encrypts the detailed information of the item layer by layer with the session key of the adjacent node according to the node sequence of the response path. By completing the complete interactive design and the protection knot in the unique illusory environment, the application and discussion of privacy protection is achieved in the context of Internet of Things, creating a design concept for trusted computing and privacy protection methods for IoT nodes, and discussing the rationality of interactive design in the process of trusted computing and privacy protection methods for IoT nodes. The simulation results show that the application of fuzzy logic blockchain is very extensive, and the trusted computing and privacy protection methods of IoT nodes have a broader platform and a more open environment.
【Keywords】
【发表时间】2022 AUG 31
【收录时间】2022-10-25
【文献类型】理论模型
【主题类别】
区块链技术-协同技术-隐私计算
【DOI】 10.1155/2022/9649862
评论