期刊文献+

M2M技术及其安全性讨论 被引量:1

On M2M Technology and Its Security
下载PDF
导出
摘要 文章介绍了M2M的概念、架构与应用,并给出了一个具体的M2M应用实例。分析了M2M的安全威胁和对策,简要回顾了当前的M2M安全研究现状,指出了需要研究的M2M安全问题并加以分析。 The concept, architecture and applications of M2M are introduced. The concrete M2M application is illustrated. The M2M security threat and countermeasures are analyzed. The related works on M2M security are reviewed. M2M research problems are pointed out.
出处 《信息网络安全》 2012年第7期6-9,28,共5页 Netinfo Security
基金 国家自然科学基金面上项目[61170217] 中央高校基本科研业务费项目[110109]
关键词 M2M安全 物联网安全 安全架构分析 M2M security internet of things security security architecture analysis
  • 相关文献

参考文献11

  • 1腾讯分析称移动运营商或在M2M市场创收250亿欧元[EB/OL]http://tech.qqcom/a/20120224/000309.htm,2012-02-24.
  • 2M2M magazine[EB/OL], http://www.machinetomachinemagazine. corn, 2012-06-02.
  • 3M2M技术在国内外标准进展现状[J].金卡工程,2011(11):52-54. 被引量:1
  • 4晁世伟,杨元,李静毅.物联网M2M的安全分析及策略[J].计算机科学,2011,38(B10):7-9. 被引量:5
  • 5焦文娟,齐旻鹏,朱红雪.M2M的安全研究[J].电信技术,2009(6):76-78. 被引量:3
  • 63GPP Ttk 33.812, Feasibility study on the security aspects of remote provisioning and change of subscription for Machine to Machine (M2M) equipment[S].
  • 7ETSI TC M2M Security Architecture, ETSI workshop[EB/OL]. Jan. 2{)12, http://workshop.etsi.org/2012/20120 I_SECURITYWORKSHOP/ REPORT.pdf, 2012-06-21.
  • 8Alper Yegin, ETSI M2M TC WG4. ETSI M2M Security Architecture[EB/ OL]. http://workshop.etsi.org/2012/201201_SECUR1TYWORKSHOP/ 7_M2MandSMARTGRIDS/ETSITCM2M Securiw_Architecture YEGI N%20.pdf, 2012-06-02.
  • 9Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin Shen, Xiaodong Lin. GRS: The green, reliability, and security of emerging machine to machine communications[J]. [EEE Communications Magazine,2011, 49(04): 28-35.
  • 10C Inhyok, Y, Shah, A U, Schmidt, A, Leicher, M V Meyerstein. Trust in M2M communication[J]. IEEE Vehicular Technology Magazine, 2009, 4(03): 69-75.

二级参考文献15

  • 1Weiser M. The Computer for the Twenty-First Century[J]. Scientific American, 1991,265(3) :94-104.
  • 2Ahola J. Ambient Intelligence[J]. ERCIM News, 2001 (47)http://www, ercim, org/publication/Ercim_News/enw47/intro. html, 2001.
  • 3International Telecommunication Union UIT[R]. ITU Internet Reports 2005:The Internet of Things. 2005.
  • 4Dai Guo-hua, Li Bao-rong, Liu Zhao-yuan. M2M Industry Development Status and Problems [P]. Guangzhou Research Institute of China Teleeom Co. , Ltd. 2008.
  • 53^rd Generation Partnership Project(3GPP). (2007, Mar. ). Study on facilitation of machine-to-machine communication in 3GPP systems[R]. 3GPP Tech. Rep. 22,868, version 8.0. 0lOLl. ftp. 3gpp. org/Specs/archive/22_series/22,868/22868-800, zip.
  • 6朱红儒,齐曼鹏.物联网面对的安全问题[J].中国移动研究院,2009.
  • 7LiuXiao-peng. Internet of things in information security. 2010.
  • 8Leieher A, Kuntze N, Schmidt A U. Implementation of a trusted ticket system[C]//Proc. IFIP Int. Information Security Conf SEC2009. Boston, MA, to be published.
  • 9Brickell E, Cameniseh I, Chen L. Direct anonymous attestation [C]//Proc. 11^th ACM Conf. Computer and Communications Security. 2004 : 132-145.
  • 10Camenisch J. Better privacy for trusted computing plafforms[C]// Proc. 9^th European Symp. Research in Computer Security(ESO- RICS'04). 2004 : 73-88.

共引文献5

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部