期刊文献+

物联网框架安全威胁及相应策略研究 被引量:3

Framework and Security Threats on Internet of Things and Survey of Corresponding Strategies
下载PDF
导出
摘要 与传统的互联网相比,物联网具有更高的安全需求。在物联网环境下,基本的管理工作由智能设备软件去处理,使人们从繁琐的低层次管理中解脱出来,将更多的人力、物力投入到新技术的研发中,产生巨大的经济和社会效益。然而一旦物联网的安全受到威胁、遭到攻击,损失将是不可估量的。物联网的健康迅猛发展,安全保障是其重要的前提。通过对物联网的基本概念、结构框架、技术框架的阐述,分析了物联网的相关特征,针对物联网各层的特点,分析了感知层、网络层、应用层存在的安全问题,并提出了一些解决思路。 Compared with traditional Intemet, Interact of Things ( IoT ) has higher security needs. In the context of lot, the basic management work will be handed by intelligent device software,so that people are free from redious low-level managemant,pouring more human and material resources into research of new technologies, resulting in huge economic and social benefits. However, once IoT is at stake or attacked,the loss will be immeasurable. Security is the premise of rapid development of IoT. On the basis of concept, structure and technology framework of IoT, analyzed characteristics on IoT. Aiming at the characteristics of levels on IoT, analyzed the safety problems of perception layer ,network layer and application layer, put forward relevant countermeasures for different security problems.
出处 《计算机技术与发展》 2011年第12期148-151,共4页 Computer Technology and Development
基金 山东省自然科学基金(ZR2011FM019) 山东省软科学研究计划(2010RKB03012)
关键词 物联网 射频标识 基本框架 安全 Interact of Things RFID basic framework safety
  • 相关文献

参考文献12

  • 1The Internet of Things [ EB/OL]. 2009-09-06. http ://www. itu. int.
  • 2Croat J J. Neodymium-iron-boron permanent magnets prepared by rapid solidification [J]. J. Mater. Eng., 1988, 10: 1.
  • 3杨庚,许建,陈伟,祁正华,王海勇.物联网安全特征与关键技术[J].南京邮电大学学报(自然科学版),2010,30(4):20-29. 被引量:131
  • 4陈柳钦.物联网:国内外发展动态及亟待解决的关键问题[EB/OL].2010.www.chinavalue.net/Article/Archive/2010/8/10/192271_13.html.
  • 5吴同.浅析物联网的安全问题[J].网络安全技术与应用,2010(8):7-8. 被引量:32
  • 6沈苏彬,范曲立,宗平,毛燕琴,黄维.物联网的体系结构与相关技术研究[J].南京邮电大学学报(自然科学版),2009,29(6):1-11. 被引量:572
  • 7李志华 许榕生.物联网安全保卫战.计算机世界,2010,:1-4.
  • 8四大关键技术保卫物联网安全不受威胁[EB/OL].http://miit.ccidnet.com/art/32559/20100719/2120335_1.html.2010.07.19.
  • 9武传坤.物联网安全架构初探[J].中国科学院院刊,2010,25(4):411-419. 被引量:76
  • 10Taylor A, Harper R, Swan L, et al. Homes that make us smart [ J ]. Personal and Ubiquitous Computing, 2007,11 ( 5 ) : 383 - 393.

二级参考文献82

  • 1梁国伟,李长武,李文军.网络化智能传感技术发展浅析[J].微计算机信息,2004,20(7):54-56. 被引量:16
  • 2杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 3宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 4UIT. ITU Internet Reports 2005 :The Intemet of Things[ R ]. 2005.
  • 5SHA Lui, GOPALAKRISHNAN S, LIU Xue, et al. Cyber-Physical Systems:A New Frontier[ C ] //2008 IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing ( sute 2008 ). June 2008 : 1 - 9.
  • 6WOLF W. Cyber-physical Systems [ J ]. Computer, 2009,42 ( 3 ) : 88 - 89.
  • 7EASWARAN A, LEE Insup. Compositional schedulability analysis for cyber-physical systems [ J ]. 5IGBED Review, 2008,5 ( 1 ) : 11 - 12.
  • 8TAN Ying, GODDARD S, PEREZ L C. A prototype architecture for cyber-physical systems [ J ]. SIGBED Review,2008,5 ( 1 ) : 51 - 52.
  • 9President' s Council of Advisors on Science and Technology. Leadership Under Challenge: Information Technology R&D in a Competitive World, An Assessment of the Federal Networking and Information Technology R&D Program [ EB/OL ]. [ 2007-08-30]. http:// ostp. gov/pdf/nitrd_review. pdf.
  • 10YAN Bo, HUANG Guangwen. Supply chain information transmission based on RFID and internet of things [ C ] //ISECS International Colloquium on Computing, Communication, Control and Management. 2009,4 : 166 - 169.

共引文献793

同被引文献27

  • 1张靖,景旭,孙晓波.AODV协议的简单智能化研究[J].哈尔滨理工大学学报,2005,10(1):114-117. 被引量:1
  • 2叶东海,吕捷.考虑安全与公平的电子市场[J].南京师范大学学报(工程技术版),2010,10(4):84-87. 被引量:1
  • 3Atzori L, Iera A, Morabito G. The Internet of Things : A Survey [ J ]. Computer Networks ,2010,54 ( 15 ) :2787-2805.
  • 4Zhang G P. Neural networks for classification: a survey [ J ]. IEEE Trans. on System, Man, and Cybernetics-Part C : Appli- cation and Reviews,2000,30(4) :451-462.
  • 5Zhang H, Arora A. Gs3: scalable self-eonfiguration and self healing in wireless sensor networks [ J ]. Computer Networks, 2000,43 (4) :459 -480.
  • 6Gupta P, MeKeown N. Algorithms for Packet Classification [ J ]. IEEE Network Magazine,2001,15 (2) :24-32.
  • 7Mhatre V, Rosenberg C. Homogeneous vs. heterogeneous clus- tered sensor networks : a comparative study [ C ]//IEEE Inter- national Conference on Communications (ICC 2004 ). Paris, France : [ s. n. ] ,2004:33-40.
  • 8徐秋丽.水货假货严重危害电子商务发展[EB/OL].2012[2012-02一11].http://news.163.com/12/021I/04/7PV3304U00014AED.html.
  • 9Sy D, Bao Lichun. CAPTRA : Coordinated Packet Traceback [ C]//Proceedings of 5th International Conference on Infor- mation Processing in Sensor Networks. [ s. 1. ] : [ s. n. ] ,2006 : 152-159.
  • 10Zhang Qiyuan, Zhou Xuehai, Yang Feng. CAPTRA: Coordina- ted Packet Traceback [ C ]//Proceedings of the International Conference on Wireless Communicaions, Networking and Mo- bile Computing. [ s. 1. ] : [ s. n. ] ,2007:2487-2490.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部