Information Security Analysis Based on Remote Wireless Communication Technology

Gao Fangjing, Yao Lanbo, Wang Junyan, Zhang Yongnai, Qin Hao, Chen Yuanbo

Integrated Circuits and Embedded Systems ›› 2023, Vol. 23 ›› Issue (1) : 22-25.

PDF(1282 KB)
PDF(1282 KB)
Integrated Circuits and Embedded Systems ›› 2023, Vol. 23 ›› Issue (1) : 22-25.
TECHNOLOGY REVIEW

Information Security Analysis Based on Remote Wireless Communication Technology

  • Gao Fangjing1, Yao Lanbo1, Wang Junyan1, Zhang Yongnai1, Qin Hao1, Chen Yuanbo2
Author information +
History +

Abstract

Aimming at the problems of long time,low efficiency and poor applicability in the algorithm model construction of information security analysis in traditional control systems,the STM32F103 is used as the main control chip to realize the control,collection and application of the control system.The AM49587 demodulator chip is added to the control system as the basis of the remote communication technology,which greatly improves the monitoring accuracy and ensures the speed and security of information transmission.In terms of algorithm,based on information genetic algorithm,the analysis model strategy and algorithm construction of control system information are proposed.Under certain circumstances,the security of system control information is improved,and the optimal operation mode of the control system is formulated.Through the simulation test,the monitoring error of the research hardware is at least 1.42%,which greatly improves the monitoring ability.

Key words

information security analysis / information genetic algorithm / STM32F103 / AM49587

Cite this article

Download Citations
Gao Fangjing, Yao Lanbo, Wang Junyan, Zhang Yongnai, Qin Hao, Chen Yuanbo. Information Security Analysis Based on Remote Wireless Communication Technology[J]. Integrated Circuits and Embedded Systems. 2023, 23(1): 22-25

References

[1] 杨钊,左鑫.计算机网络与大数据的信息安全分析[J].集成电路应用,2021,38(11):144-145.
[2] 陶彩栋.大数据时代计算机网络信息安全分析—评《计算机网络安全技术》[J].热带作物学报,2021,42(10):3095.
[3] 刘红,谢永恒,王国威,等.基于跨领域本体的信息安全分析[J].信息网络安全,2020,20(9):82-86.
[4] Guo J,Hoyt N,Williamson M.Multielectrode Array Sensors to Enable Long-Duration Corrosion Monitoring and Control of Concentrating Solar Power Systems[J].Journal of Electroanalytical Chemistry,2021,884(4):115064.
[5] 高辉.企业网络信息安全分析[J].网络安全技术与应用,2020(8):113-114.
[6] 王林林,董伟,程明敏.车联网信息安全风险分析及防护技术[J].汽车实用技术,2020(13):17-19
[7] Yildiz B,Roberts M,Bilbao J I,et al.Assessment of control tools for utilizing excess distributed photovoltaic generation in domestic electric water heating systems[J].Applied Energy,2021,300(2):117411.
[8] 孙卓,刘东,肖安洪,等.基于攻击树模型的数字化控制系统信息安全分析[J].上海交通大学学报,2019,53(S1):68-73.
[9] 杨明杰,戴芮,苏蕊.电力信息系统信息安全分析[J].电子世界,2019(11):95-96.
[10] Dossi M,Forte E,Andri S,et al.Percolation monitoring and water content estimation by Ground Penetrating Radar in a controlled environment[J].Journal of Applied Geophysics,2021,190(4):104336.
[11] 张磊.城轨CBTC系统信息安全分析[J].铁路通信信号工程技术,2019,16(2):60-63.
PDF(1282 KB)

Accesses

Citation

Detail

Sections
Recommended

/