期刊文献+

物联网网络安全防护研究 被引量:2

下载PDF
导出
摘要 物联网网络技术具有"双刃剑"的作用,一方面给我们带来便利,一方面带来很多不安全因素。在越来越强调生命尊严和生活质量的今天,与人们的生产、生活息息相关的物联网网络的安全尤其重要。本文首先阐述了物联网的特征,其次,物联网面对的四个安全问题,分别是RFID系统安全问题、物联网业务的安全问题、核心网络的传输与信息安全问题、黑客很容易窃取和干扰物联网信息的传输,同时,就物联网网络安全防护措施进行了较为深入的探讨,具有一定的参考价值。
作者 朱义勇
出处 《电子技术与软件工程》 2013年第16期243-244,共2页 ELECTRONIC TECHNOLOGY & SOFTWARE ENGINEERING
  • 相关文献

参考文献5

  • 1朱哲学,吴昱南.物联网时代的信息安全新问题分析[J].网络安全技术与应用,2010(10):12-14. 被引量:9
  • 2杨庚,许建,陈伟,祁正华,王海勇.物联网安全特征与关键技术[J].南京邮电大学学报(自然科学版),2010,30(4):20-29. 被引量:131
  • 3OLESHCHUK V.Internet of things and p rivacy p reserving technologies[].Proc ofst InternationalConference onWireless Communication Vehicular Technology Information Theory and Aerospace&Electronic Systems Technology.2009
  • 4S.A.Weis."Security Parallels between People and Pervasive Devices,"[].Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops.2005
  • 5WEIS S,SARMA S,RIVEST V,ENGELS D.Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems[].the Proceedings of the First Security in Pervasive Computing.2004

二级参考文献47

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 3俞晓秋.对信息技术与国家安全若干问题的思考[J].现代国际关系,2001,(3).
  • 4http://www.epcglobalinc.org/.
  • 5HAMAD F,SMALOV L,JAMES A.Energy-aware security in M-commerce and the Internet of Things[J].IETE,Technical review,2009,26(5):357-362.
  • 6WATRO R,KONG D,et al.TinyPK:Securing sensor networks with public key technology[C]∥ Proc of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM press,2004:59-64.
  • 7BENENSON Z,GEDICKE N,RAIVIO O.Realizing robust user authentication in sensor networks[C]∥Proc of the Workshop on Real-World Wireless Sensor Networks(REALWSN 2005).[S.l.]:Stockholm,2005.135-142.
  • 8MALAN D J,WELSH M,SMITH M D.A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C]∥ 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks.Piscataway:IEEE,2004:71-80.
  • 9OUADJAOUT A,CHALLAL Y,LASLA N,et al.SEIF:Secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks[C]∥Proc of the Third International Conference on Availability,Reliability and Security(ARES 2008).Piscataway:IEEE,2008:503-508.
  • 10MA R,XING L D,MICHEL H E.A new mechanism for achieving secure and reliable data transmission in wireless sensor networks[C]∥Proc of the 2007 IEEE Conference on Technologies for Homeland Security:Enhancing Critical Infrastructure Dependability.Piscataway:IEEE,2007:274-279.

共引文献134

同被引文献9

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部