
Research Article
Construction of a Gateway Boundary Security Protection Platform Based on the Internet of Things and Cloud Computing
@INPROCEEDINGS{10.1007/978-3-031-18123-8_4, author={Chen Cheng and Siyao Xu and Mingyang Peng and Ziying Zhang and Yan Li}, title={Construction of a Gateway Boundary Security Protection Platform Based on the Internet of Things and Cloud Computing}, proceedings={Multimedia Technology and Enhanced Learning. 4th EAI International Conference, ICMTEL 2022, Virtual Event, April 15-16, 2022, Proceedings}, proceedings_a={ICMTEL}, year={2022}, month={10}, keywords={Internet of Things Cloud computing Gateway boundary Security protection platform}, doi={10.1007/978-3-031-18123-8_4} }
- Chen Cheng
Siyao Xu
Mingyang Peng
Ziying Zhang
Yan Li
Year: 2022
Construction of a Gateway Boundary Security Protection Platform Based on the Internet of Things and Cloud Computing
ICMTEL
Springer
DOI: 10.1007/978-3-031-18123-8_4
Abstract
In view of the problems of long warning time and poor protection effect of traditional gateway boundary security protection platform, a gateway boundary security protection platform based on Internet of things and cloud computing is designed. Net FPGA chip is used for the verification and development of network communication equipment, connecting the ATA serial port connection line port of multiple boards. Combined with the register host computer, the read-write operation of the registers inside each module in the hardware is completed through PCI bus, and the hardware design of the gateway boundary security protection platform is completed. Establish the gateway border security protection module and complete the software design of the gateway border security protection platform. Based on the Internet of things and cloud computing technology, match the network security link, so as to realize the security protection of the network boundary. The experimental results show that the security protection effect of the platform constructed in this paper is better, and can effectively shorten the security early warning time.