期刊文献+

物联网信息完整性保护方案 被引量:5

A Scheme of IOT Message Authentication
下载PDF
导出
摘要 轻量化的密码算法及安全协议属于物联网安全体系的关键技术。文章以有序非重复序列为基础,设计了一种轻量化的消息认证码方案,具有开销小、防重放、可追溯等特性,并结合物联网的实际情况研制了低成本的消息认证码生成设备和认证管理系统,通过设备类型的多样化满足物联网密码技术的等级化应用要求。 Lightweight cryptographic algorithms and protocols are the key technologies of the Internet of Things security. Based on ordered and non-repeated sequences, an anti-replacement message authentication code mechanism is designed, which is also low-cost, lightweight and traceable. A practical realization system, including three types of devices, authentication server and management server, is also introduced.
出处 《信息网络安全》 2012年第8期1-2,共2页 Netinfo Security
关键词 物联网 有序非重复序列 消息认证码 IOT ordered and non-repeated sequence message authentication code
  • 相关文献

参考文献6

  • 1ITU.Intemet Report 2005: Intemet of Things [EB/OL] . http://www.im. int/osg/spu/publications/mtemetofhfings/, 2011-04-04/2012-07-12.
  • 2丁超,杨立君,吴蒙.IoT/CPS的安全体系结构及关键技术[J].中兴通讯技术,2011,17(1):11-16. 被引量:20
  • 3吴振强,周彦伟,马建峰.物联网安全传输模型[J].计算机学报,2011,34(8):1351-1364. 被引量:73
  • 4Karlof C, Wagnerd. Secure Rooting in Wireless Sensor Networks: Attacks and Countermeasures [C].IEEE Computer Society. Proceedings of 1st international Workshop on Sensor Network Protocols and Applications (SNPA '03). Los Alamitos, CA, USA: 2003.113-127.
  • 5李伟,于华章,朱鹏飞显示交互型USBKey的动态验证机制[C].中国计算机学会信息保密专业委员会,第19届全国信息安全保密学术会议论文集(IS2009),北京:2009358-361.
  • 6彭勇,谢丰劼,郭晓静,宋丹,李剑.物联网安全问题对策研究[J].信息网络安全,2011(10):4-6. 被引量:19

二级参考文献36

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 3ITU Internet Report 2005:The Internet of Things[R/OL].[2005-11-17] http://www.itu.int/osg/spu/publications/internetofthings/.
  • 4OHN H,MARBURGER J H,KVAMME E F,et al.Leadership Under Challenge:Information Technology R&D in a Competitive World[R/OL].[2005-11-17].An Assessment of the Federal Networking and Information Technology R&D Program.2007-08.http://ostp.gov/pdf/nitrd_review.pdf.
  • 5蒋林涛.单一IP技术很难满足物联网的需求[C] //2000年中国通信产业发展形势报告会,北京.2010.
  • 6KARLOF C,WAGNER D.Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[C] //Proceedings of the 1 st International Workshop on Sensor Network Protocols and Applications (SNPA'03),May 11,2003,Berkeley,CA,USA.Los Alamitos.CA,USA:lEEE Computer Society,2003:113-127.
  • 7STALLINGS W.Cryptography and Network Security:Principles and Practice[M] 4th ed.Boston.MA,USA:Prentice Hall,2006.
  • 8CARDENAS A A.AMIN S,SASTRY S.Secure Control:Towards Survivable Cyber-Physical Systems[C] //Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS'08),Jun 17-20,2008,Beijing,China Piscataway,NJ,USA:IEEE,2008:495-500.
  • 9ABDELZAHER T.Research Challenges in Distributed Cyber-Physical Systems[C] //Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing(EUC'08):Vol 1,Dec 17-20,2008,Shanghai,China.Piscataway,NJ,USA:IEEE,2008:5.
  • 10DJENOURI D,KHELLADI L,BADACHE A N.A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks[J].IEEE Communications Surveys & Tutorials,2005,7(4):2-28.

共引文献109

同被引文献26

引证文献5

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部