期刊文献+

物联网安全模型与加密算法应用

Internet of Things Security Models and Encryption Algorithm
下载PDF
导出
摘要 物联网包含嵌入式计算机、不显眼的传感器、全球系统以及大数据分析环境,这些系统、传感器和设备都在进行互相通信,构建了一个与生活无缝连接的无处不在的网络。安全问题已经成为制约物联网发展的一个瓶颈,通过分析物联网的安全性和可能面临的攻击,对物联网的安全模型进行分析研究,讨论了同态加密在其中的应用。 IOT contains embedded computer,sensors, global system and the analysis of the big data environment. These systems,sensors and devices to communicate with each other are doing,build a ubiquitous network seamlessly connected to our lives. Safety problem has become a bottleneck restricting the development of the Internet of things,through the analysis of the security of the Internet of things and could face attack,the security model of IOT is studied the application of Homomorphic encryption is discussed.
作者 叶质刚
出处 《电脑开发与应用》 2015年第3期77-78,81,共3页 Computer Development & Applications
关键词 物联网 安全模型 同态加密 internet of things security model homomorphic encryption
  • 相关文献

参考文献5

二级参考文献62

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 3http://www.epcglobalinc.org/.
  • 4HAMAD F,SMALOV L,JAMES A.Energy-aware security in M-commerce and the Internet of Things[J].IETE,Technical review,2009,26(5):357-362.
  • 5WATRO R,KONG D,et al.TinyPK:Securing sensor networks with public key technology[C]∥ Proc of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM press,2004:59-64.
  • 6BENENSON Z,GEDICKE N,RAIVIO O.Realizing robust user authentication in sensor networks[C]∥Proc of the Workshop on Real-World Wireless Sensor Networks(REALWSN 2005).[S.l.]:Stockholm,2005.135-142.
  • 7MALAN D J,WELSH M,SMITH M D.A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C]∥ 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks.Piscataway:IEEE,2004:71-80.
  • 8OUADJAOUT A,CHALLAL Y,LASLA N,et al.SEIF:Secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks[C]∥Proc of the Third International Conference on Availability,Reliability and Security(ARES 2008).Piscataway:IEEE,2008:503-508.
  • 9MA R,XING L D,MICHEL H E.A new mechanism for achieving secure and reliable data transmission in wireless sensor networks[C]∥Proc of the 2007 IEEE Conference on Technologies for Homeland Security:Enhancing Critical Infrastructure Dependability.Piscataway:IEEE,2007:274-279.
  • 10DENG Jing,HAN R,MISHRA S.Insens:Intrusion tolerant routing for wireless sensor networks[J].Computer Communications,2006,29(2):216-230.

共引文献143

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部