Research Article

Based on the Role of Internet of Things Security in the Management of Enterprise Human Resource Information Leakage

Table 1

Node identity and startup configuration file.

EquipmentNode identityWebsite addressConfiguration file

LaptopClient,Node1(Org1)192.16.10.119Channel profile
Industrial PC1OrdererOrg,master192.16.10.239Channel profile
Industrial PC2Node0(Org2)192.16.10.64Channel profile
Industrial PC3Node0(Org1)192.16.10.72Channel profile
Data collectorNode1(Org2)192.16.10.46Channel profile