期刊文献+

应用于军事物流中的物联网安全性研究 被引量:3

Study on Safety of IOT in Military Logistics Application
下载PDF
导出
摘要 针对应用于军事物流的物联网中的若干安全问题进行了研究,给出了军事物流中物联网的基本架构,对其三个逻辑层的安全威胁和安全需求进行了分析,最后给出了安全措施和安全架构。 In this paper, we studied several safety problems in the application of IOT in military logistics, presented the basic arehitecture of the military logistics IOT, analyzed the safety threats and demand of three logic layers therein, and at the end presented the safety measures and architecture.
作者 宫晓曼
出处 《物流技术》 北大核心 2013年第8期276-278,共3页 Logistics Technology
基金 江西省教改课题"电子商务实务实践教学改革研究"(JXJG-11-91-8)
关键词 物联网 军事物流 网络安全 IOT military logistics network safety
  • 相关文献

参考文献4

二级参考文献58

  • 1Michael Miller姜进磊,孙瑞志,向勇等译.云计算[M].北京:机械出版社.2009.
  • 2刘云浩.物联网导论[M].北京:科学出版社,2011.
  • 3Medaglia C M, Serbanati A. An overview of privacy and security issues in the Internet of things [C]// Proceedings of the 20th Tyrrhenian Workshop on Digital Communications. Sardinia, Italy: Springer, 2010:389-395.
  • 4Leusse P, Periorellis P, Dimitrakos T. Self managed security cell, a security model for the Internet of Things and services [C]// Proceedings of the 1st International Conference on Advances in Future Internet. Athens/Glyfada, Greece: IEEE, 2009: 47-52.
  • 5Hamad F, Smalov L, James A. Energy-aware security in M commerce and the Internet of Things[J].IETE Technical review, 2009, 26(5) : 357 - 362.
  • 6Juels A. RFID security and privacy: A research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) :381 - 394.
  • 7Weber R H. Internet of Things New security and privacy challenges [J]. Computer Law & Security Reviezo, 2010, 26(1): 23-30.
  • 8CHEN Xiangqian, Makki K, Yen K, et al. Sensor network security: A survey [J]. IEEE communications Surveys Tutorials, 2009, 11(2) : 52 - 73.
  • 9Asrar I. Could sexy space be the birth of the sms botnet? [Z/OL]. (2010-10-16), http: //www. symantec, corn/connect/ blogs/could-sexy-space-be-birth-sms-botnet.
  • 10Karygiannis T, Eydt B, Barber B, et al. Guidance for securing radio frequency identification (RFID) systems [Z/OL]. (2010-10-16), http: //www. google, com. hk/url? sa = t&source- web&cd = 1&ved -- 0CCIQFjAA&url = http%3A%2F%2Fwww, rfidsecurityalliance, org%2Fdocs %2FDraft SP800-98%2520-%2520Guidance%2520for%2520 Securing%2520RFID. pdf&ret = j%q -- XSBlaN5D X 09Guidance% 20for% 20Securing%20Radio% 20Frequency %20Identification%20(RFID) %20Systems. &ei = vxhwTqbYLa 64iAfk2LCtCQ&usg = AFQjCNGoB6IJZ12KcFBUkWh_ 5PWGkOQSpg&cad- rjt.

共引文献128

同被引文献16

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部