期刊文献+

物联网信息安全策略研究

The Research of IOT Information Security Strategy
下载PDF
导出
摘要 为了保障物联网信息安全,文章通过技术手段和管理方法,提出了一些物联网信息安全策略.基于射频识别技术和无线传输安全隐患,采用身份认证、访问控制、入侵检测和自我修复等节点安全技术,限制数据包发送速度及传输次数和引入可信匿名认证机制等传输安全技术,加强密钥管理,促进技术研发.基于物联网缺乏安全管理平台和法律保障体系等安全问题,提出加强物联网管理,实施立法保护. To ensure the safety of IOT (Internet of things) ,article puts forward some safety strategy about IOT information in aspects of the technology and management .On base of the using of RFID (Radio Frequency Identification) and the detect of wireless transmission ,we can strengthen the management secret key and promote technological development through the following ways :identity authentication、access control、node security technology including intrusion detection and self repairing 、transmission technology such as restricting the packet transmission rate and transmission number and drawing into trusted anonymous identity authentication .Recognizing lack of the safety management platform and legal safeguard ,author presents that we should strengthen the IOT management and implement legislative protection .
作者 笪林梅
出处 《商丘职业技术学院学报》 2014年第2期28-30,共3页 JOURNAL OF SHANGQIU POLYTECHNIC
基金 2013年江苏省社科研究文化精品重点课题"物联网环境下的信息共享与信息安全研究"(项目编号:13SWB-005)
关键词 物联网 安全 节点 传输 密钥 技术 立法 The Internet of things security node transmission secret key technology legislation
  • 相关文献

参考文献5

二级参考文献27

  • 1陈立辉.互联网与社会组织模式重塑:一场正在进行的深刻社会变迁[J].社会学研究,1998(6):13-30. 被引量:39
  • 2陆俊,严耕.国外网络伦理问题研究综述[J].国外社会科学,1997(2):15-19. 被引量:127
  • 32010年政府工作报告[EB/OL].中国网,2010-3-15.
  • 4邬贺铨.物联网是互联网运用的拓展更具专业性[EB/OL].[2010-03-15] http://news.163.com/10/1028/15/6K3H05RP00014JB5.html.
  • 5传感器:物联网成引擎新技术催生新机遇[N].中国电子报,2010-07-13,.
  • 6MEDAGLlA C M,SERBANATI A.An Overview of Privacy and Security Issues in the Internet of Things[C] //The Internet of Things:Proceedings of the 20th Tyrrhenian Workshop on Digital Communications,Sep 2-4,2009,Sardinia,ltaly.Berlin,Germany:Springer-Verlag,2010:389-394.
  • 7SAVRY O,VACHERAND F.Security and Privacy Protection of Contactless Devices[C] //The Internet of Things:Proceedings of the 20th Tyrrhenian Workshop on Digital Communications,Sep 2-4,2009,Sardinia,ltaly.Berlin.Germany:Springer-Verlag,2010:409-418.
  • 8Yun Zhou, Yuguang Fang, and Yanchao Zhang. Securing wireless sensor networks: a survey. IEEE Communications Surveys and Tutorials, 2008 : 6-28.
  • 9朱晓荣,孙君,齐丽娜,等.物联网[M].北京:人民邮电出版社.2010.
  • 10International Telecommunication Union (ITU). Intemet reports 2005 : the Intemet of Things[ R/OL]. (2005 - 11 ) http://www. itu. int/dms_pub/itu - s/opb/pol/S - POL - IR. IT - 2005 - SUM - PDF - E. pdf.

共引文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部