期刊文献+

物联网系统安全威胁与应对措施初探 被引量:1

Research on the Internet of Things System Security Threats and Response Measures
下载PDF
导出
摘要 物联网技术作为新一代信息技术,得到世界各国的高度重视并大力实践,我国也正在大力发展物联网产业。物联网的发展、安全和隐私问题不容回避。为解决物联网的安全问题,从物联网的体系架构出发,分层分析相应的安全威胁,并给出对应的应对措施。 As a new generation of information technology, the Internet of Things technology gets the atten- tions from all over the world and be practiced energetically, and China is vigorously developing. The development of the Internet of Things, security and privacy issues can't be avoided. In or- der to solve the security issues of the Internet of Things, starting from the architecture of the Internet of Things, analyses the security threats and gives the corresponding response.
作者 王自力 郑鑫
出处 《现代计算机(中旬刊)》 2012年第12期7-10,共4页 Modern Computer
基金 河南省科技计划项目(No.122300410220)
关键词 物联网系统 安全威胁 应对措施 射频识别 RFID Internet of Things Systems Security Threats Response Measures Radio Frequency Identification RFID
  • 相关文献

参考文献3

二级参考文献32

  • 1Medaglia C M, Serbanati A. An overview of privacy and security issues in the Internet of things [C]// Proceedings of the 20th Tyrrhenian Workshop on Digital Communications. Sardinia, Italy: Springer, 2010:389-395.
  • 2Leusse P, Periorellis P, Dimitrakos T. Self managed security cell, a security model for the Internet of Things and services [C]// Proceedings of the 1st International Conference on Advances in Future Internet. Athens/Glyfada, Greece: IEEE, 2009: 47-52.
  • 3Hamad F, Smalov L, James A. Energy-aware security in M commerce and the Internet of Things[J].IETE Technical review, 2009, 26(5) : 357 - 362.
  • 4Juels A. RFID security and privacy: A research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) :381 - 394.
  • 5Weber R H. Internet of Things New security and privacy challenges [J]. Computer Law & Security Reviezo, 2010, 26(1): 23-30.
  • 6CHEN Xiangqian, Makki K, Yen K, et al. Sensor network security: A survey [J]. IEEE communications Surveys Tutorials, 2009, 11(2) : 52 - 73.
  • 7Asrar I. Could sexy space be the birth of the sms botnet? [Z/OL]. (2010-10-16), http: //www. symantec, corn/connect/ blogs/could-sexy-space-be-birth-sms-botnet.
  • 8Karygiannis T, Eydt B, Barber B, et al. Guidance for securing radio frequency identification (RFID) systems [Z/OL]. (2010-10-16), http: //www. google, com. hk/url? sa = t&source- web&cd = 1&ved -- 0CCIQFjAA&url = http%3A%2F%2Fwww, rfidsecurityalliance, org%2Fdocs %2FDraft SP800-98%2520-%2520Guidance%2520for%2520 Securing%2520RFID. pdf&ret = j%q -- XSBlaN5D X 09Guidance% 20for% 20Securing%20Radio% 20Frequency %20Identification%20(RFID) %20Systems. &ei = vxhwTqbYLa 64iAfk2LCtCQ&usg = AFQjCNGoB6IJZ12KcFBUkWh_ 5PWGkOQSpg&cad- rjt.
  • 9Eschenauer L, Gligor V. A key management scheme for distributed sensor networks [C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. New York, USA: Association for Computing Machinery, 2002, 41 - 47.
  • 10ZHANG Wensheng, Tran M. A random perturbation-based scheme for pairwise key establishment in sensor networks [C]// Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing. New York, USA: Association for Computing Machinery, 2007: 90 - 99.

共引文献130

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部