期刊文献+

IoT/CPS的安全体系结构及关键技术 被引量:20

Security Architecture and Key Technologies for IoT/CPS
下载PDF
导出
摘要 物联网(IoT)和信息物理融合系统(CPS)作为下一代网络的核心技术,被业界广泛关注。与传统网络不同,IoT/CPS异构融合、协同自治、开放互连的网络特性带来了巨大的系统安全方面的挑战。挑战包括安全协议的无缝衔接、用户隐私保护等。研发新的安全模型、关键安全技术和方法是IoT/CPS发展中的重点。文章基于IoT/CPS安全需求和威胁模型,提出了一种层次化的安全体系结构,并针对隐私保护、跨网认证和安全控制等IoT/CPS的关键安全技术展开讨论。 Internet of Things(IoT) and Cyber-Physical Systems(CPS) are core technologies of next generation networks,and are the focus of research in both academia and industry.IoT/CPS has unique characteristics including heterogeneous integration,collaborative autonomy,and open interconnection that raise a number of issues for system security.These issues include seamless connection between security protocols,and preservation of user privacy.Developing novel security models,key technologies,and approaches is therefore critical in the development of IoT/CPS.This paper proposes an hierarchical security architecture based on threat analysis and security requirements and discusses key technologies associated with privacy preservation,secure control,and cross-network authentication.
出处 《中兴通讯技术》 2011年第1期11-16,共6页 ZTE Technology Journal
基金 国家重点基础研究发展"(973")规划(2011CB302903) 江苏省高校自然科学研究重点项目(10KJA510035)
关键词 物联网 信息物理融合系统 安全体系结构 隐私保护 安全控制 跨网认证 Internet of things cyber-physical systems security architecture privacy preservation secure control cross-network authentication
  • 相关文献

参考文献21

  • 1ITU Internet Report 2005:The Internet of Things[R/OL].[2005-11-17] http://www.itu.int/osg/spu/publications/internetofthings/.
  • 2OHN H,MARBURGER J H,KVAMME E F,et al.Leadership Under Challenge:Information Technology R&D in a Competitive World[R/OL].[2005-11-17].An Assessment of the Federal Networking and Information Technology R&D Program.2007-08.http://ostp.gov/pdf/nitrd_review.pdf.
  • 3蒋林涛.单一IP技术很难满足物联网的需求[C] //2000年中国通信产业发展形势报告会,北京.2010.
  • 4KARLOF C,WAGNER D.Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[C] //Proceedings of the 1 st International Workshop on Sensor Network Protocols and Applications (SNPA'03),May 11,2003,Berkeley,CA,USA.Los Alamitos.CA,USA:lEEE Computer Society,2003:113-127.
  • 5STALLINGS W.Cryptography and Network Security:Principles and Practice[M] 4th ed.Boston.MA,USA:Prentice Hall,2006.
  • 6CARDENAS A A.AMIN S,SASTRY S.Secure Control:Towards Survivable Cyber-Physical Systems[C] //Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS'08),Jun 17-20,2008,Beijing,China Piscataway,NJ,USA:IEEE,2008:495-500.
  • 7ABDELZAHER T.Research Challenges in Distributed Cyber-Physical Systems[C] //Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing(EUC'08):Vol 1,Dec 17-20,2008,Shanghai,China.Piscataway,NJ,USA:IEEE,2008:5.
  • 8DJENOURI D,KHELLADI L,BADACHE A N.A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks[J].IEEE Communications Surveys & Tutorials,2005,7(4):2-28.
  • 9WANG Yong,ATTEBURY G,RAMAMURTHY B.A Survey of Security Issues in Wireless Sensor Networks[J].IEEE Communications Surveys & Tutorials,2006,8(2):2-23.
  • 10PERRIG A,STANKOVIC J,WAGNER D.Security in Wireless Sensor Networks[J].Communications of the ACM,2004,47(6):53-57.

同被引文献111

引证文献20

二级引证文献98

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部