期刊文献+

物联网安全研究 被引量:4

Study on IoT Security
原文传递
导出
摘要 物联网是计算机、互联网与移动通信网等相关技术的演进和延伸,其安全问题愈来愈受到关注。该文对物联网安全进行深入研究,对其体系结构进行分析,并将其应用模型抽象为"物、网、应用";将其安全需求概括为"谁家的物归谁管,谁家的物归谁用"。该文将"物"抽象为四类,即感知类物、被感知类物、被控制类物及感知和被控制类物,并针对每一类"物"的应用提出了具体的解决方案,同时也提出了"网"与"应用"的安全解决方案。 IoT(internet of things) is the evolution and extension of related technologies such as computer, Internet and mobile communication network, and its security issue attracts more and more attention. An in-depth study of IoT security is done, and its architecture analyzed. Meanwhile, its application model is abstracted to things, network and applications, and its security requirements summarized as things only controlled and usecl by its owner. The things are abstracted to four categories in this paper, including perceiving things, perceived things, controlled things, perceiving and controlled things, and concrete solutions for each category are proposed. At the same time, security solutions for network and application are also proposed.
作者 刘平 刘晓东
出处 《信息安全与通信保密》 2012年第2期69-72,共4页 Information Security and Communications Privacy
关键词 物联网 抽象模型 密钥分散 签名认证 IoT(Internet of things) abstracted model key dispersion signature verification
  • 相关文献

参考文献1

  • 1International Telecommunication Union. The Internet of Things[R]. [s.l.]: Ternational Telecommunication Union, 2005.

同被引文献23

  • 1SWEENEY L. k-anonymity: A Model for Protecting Privacy[J]. International Journal of Uncertainty Fuzzinessand Knowledge-based Systems, 2002, 10(5) : 557-570.
  • 2LI N, LI T, VENKATASUBRAMANIAN S. t-closeness: Privacy Beyond k-Anonymity and 1-Diversity[C]. Istanbul :IEEE, 2007: 106-115.
  • 3XIAO Z, XU .l, Meng X. p-sensitivity: A Semantic Privacy-protection Model for Location-based Services[C]. Beijing: IEEE, 2008: 47-54.
  • 4XIAO X ,TAO Y. M-invariance Towards Privacy Presecving Re-publieation of Dynamic Datasets[C].New York: ACM, 2007 : 689-700.
  • 5SHIN K G, JIJ X, CHEN Z, et al. Privacy Protection for Users of Location-based Services[J]. Wireless Communications, 1EEE, 2012, 19(2): 30-39.
  • 6刘云浩.物联网导论[M]北京:科学出版社,2010.
  • 7周水庚,李丰,陶宇飞,肖小奎.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847-861. 被引量:221
  • 8陈尚义.移动互联网安全技术研究[J].信息安全与通信保密,2010,7(8):34-37. 被引量:19
  • 9李春华,张玮.一种ECC签密算法在RFID中的应用研究[J].计算机与现代化,2010(8):191-193. 被引量:6
  • 10戴力.基于公众移动通信网的物联网应用研究[J].移动通信,2010,34(17):74-77. 被引量:5

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部