期刊文献+

一种基于PKI的物联网安全模型研究 被引量:11

RESEARCH ON A PKI-BASED IoT SECURITY MODEL
下载PDF
导出
摘要 针对传统EPC(Electronic Product Code)网络架构中对EPC数据安全性考虑不足以及访问控制具体实现难度较大等问题,提出一种基于PKI的改进的EPC网络模型。模型在传统的EPC网络架构的基础上引入一个经过简化的轻量级的PKI模块,实现通信过程中的身份认证和加密传输等服务。同时改进用户与EPCIS信息服务器的交互流程,引进可信中间服务层(TM-server)实现对通信过程的访问控制,返回给用户的数据经过密钥加密并由TM-server进行转发,以达到EPCIS服务器对用户隔离以及可信传输的目的。最后尝试引进RBAC模型,经分析表明本架构很好地实现了对EPC数据的访问控制,提升了EPC网络的安全性。 Aiming at such problems in traditional EPC network structure as not enough consideration on EPC data security as well as difficulty in access control detailed implementation etc.,the paper presents a PKI-based improved EPC network model.The model,established on traditional EPC network structure,introduces a simplified light-weight PKI module to realize such services in communication process as authentication,encrypted transmission,etc.Meanwhile,the EPCIS interactive process is ameliorated by incorporating the TM-server(Trusted Middle server) to achieve access control during the communication process.The data returned back to users are encrypted with keys and redirected via TM-server in order to attain the objective of segregating users from EPCIS servers for trustful transmission.Finally,the paper attempts to import RBAC model.Analytical results show that the proposed architecture can effectively realize access control of EPC data and promote the security of EPC network.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第6期271-274,共4页 Computer Applications and Software
关键词 物联网 PKI EPC网络 安全 访问控制 IoT(Internet of Things) PKI EPC network Security Access control
  • 相关文献

参考文献10

  • 1EPC Information Services (EPCIS) Version 1.0. 1 [ S/OL]. http:// www. epcglobalus, org/.
  • 2EPC global Object Name Service (ONS) 1.0. 1 [S/OL]. http:// www. epcglobalus, org/.
  • 3EPC global Certificate Profile Specification[ S/OL]. 2nd ed. http:// www. epcglobalus, org/.
  • 4Liu Bing, Chu Chao-Hsien. Security Analysis of EPC-Enabled RFID Network [ C ]//IEEE International Conference on RFiD-Technology and Applications, 2010.
  • 5Kim Taesung, Kim Howon. Authorization Policy for Middleware in RFID System[ C]. IEEE, 2006.
  • 6周彦伟,吴振强.TA-ONS——新型的物联网查询机制[J].计算机应用,2010,30(8):2202-2206. 被引量:4
  • 7Sun Ji~g, Ma Yu-jian. A Study on the Design and Implementation of EPCIS Trust Model [ C ]//2008 International Conference on Computer Science and Software Engineering, 2008.
  • 8韩道军,高洁,翟浩良,李磊.访问控制模型研究进展[J].计算机科学,2010,37(11):29-33. 被引量:32
  • 9Li Xun, Yoo Sang Bong, Extended Role-Based Security System using Context Informal.ion [ C ]//2008 Second International Conference on Future Generation Communication and Networking, 2008.
  • 10周海建,罗平,王道顺,戴一奇.基于CA缓存的快速公钥基础设施认证[J].清华大学学报(自然科学版),2008,48(7):1160-1164. 被引量:1

二级参考文献30

共引文献34

同被引文献100

引证文献11

二级引证文献97

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部