Research Article

Computer Information Processing System Based on RFID Internet-of-Things Encryption Technology

Table 2

Security methods at different levels of IoT.

Technical levelSafe mode

IOT perception layerHash-Lock, Hash, Random hash-lock
IOT transport layerHTTP, SSH, SFTP
IOT application layerInstitutional constraints, privacyauthority setting, identityconcealment, data confusion