期刊文献+

基于节点认证的物联网感知层信息安全传输机制的研究 被引量:11

Reliable Information Transmission Mechanism Research of the Internet of Things Sensing Layer based on the Node Authentication
下载PDF
导出
摘要 文章分析了传统物联网信息传输系统在感知层的信息传输的安全问题,应用MD5等算法在采集端点与信息采集节点之间以及信息采集节点与隔离保密节点之间增加身份认证和加密机制,实现感知节点的身份认证和信息加密,使物联网感知层的信息传输更加安全和可靠。 This paper analyzes the security of the traditional information transmission system in the Internet of Things sensing layer. By appling some methods just like the MD5 algorithm to increase the authentication and encryption mechanism between the terminal and collection node and the collection and separation node, the transmission of the information in the sensing layer becomes more secure and reliable.
作者 王景中 凌晨
出处 《信息网络安全》 2014年第2期53-57,共5页 Netinfo Security
基金 北京市自然基金重点项目[KZ2010009008] 北京市属高等学校人才强教计划[PHR2012] 科技成果转化项目[PXM2013] 北京市创新团队计划[HT20130502]
关键词 节点认证 加密机制 数字签名 数字信封 node authentication encryption mechanism digital signature digital envelope
  • 相关文献

参考文献25

二级参考文献108

共引文献235

同被引文献151

  • 1崔振山,马春光,李迎涛.物联网感知层的安全威胁与安全技术[J].保密科学技术,2012(11):61-65. 被引量:9
  • 2刘静芳,陈赤培,樊江涛.电力系统一体化设计中信息安全防护体系研究[J].电力自动化设备,2005,25(2):83-85. 被引量:27
  • 3MellP, Grance T. The NIST definition of cloud computing (draft)[J].NIST special publication, 2011, 800(145):7-12.
  • 4ClarkB, Deshane T, Dow E M, et al. Xen and the Art of RepeatedResearch[C]//USENIX Annual Technical Conference, FPJEENIX Track.2004: 135-144.
  • 5KVM.Kernel based virtual machine[EB/OL] http://www.linux-kvm.org/page/Main一Page,2014-9-11.
  • 6PayneB D, De Carbone M D P, Lee W. Secure and flexible monitoringof virtual machines[C]//Computer Security Applications Conference,2007. ACSAC 2007. Twenty-Third Annual. IEEE, 2007: 385-397.
  • 7NanceK, Hay B, Bishop M. virtual machine introspection[J].IEEEComputer Society, 2008.
  • 8XiongH, Liu Z, Xu W, et al. Libvmi: A Library for Bridging theSemantic Gap between Guest OS and VMM[C]//Computer andInformation Technology (CIT), 2012 IEEE 12th International Conferenceon. IEEE, 2012: 549-556.
  • 9WangY, Hu C, Li B. Vmdetector: a VMM-based platform to detecthidden process by multi-view comparison[C]//High-Assurance SystemsEngineering (HASE), 2011 IEEE 13th International Symposium on. IEEE,2011: 307-312.
  • 10Li tty L, Lagar-CavilJa H A, Lie D. Hypervisor Support for IdentifyingCovertly Executing Binaries[C]//USENIX Security Symposium. 2008:243-258.

引证文献11

二级引证文献62

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部