Research Article
Computer Information Processing System Based on RFID Internet-of-Things Encryption Technology
Table 2
Security methods at different levels of IoT.
| | Technical level | Safe mode |
| | IOT perception layer | Hash-Lock, Hash, Random hash-lock | | IOT transport layer | HTTP, SSH, SFTP | | IOT application layer | Institutional constraints, privacyauthority setting, identityconcealment, data confusion |
|
|