期刊文献+

军事物联网信息安全威胁及攻击技术探析 被引量:1

The Analyses of Military IOT Information Security Threaten and Attack Method
下载PDF
导出
摘要 如何保证信息安全是军事物联网应用需要突破的"瓶颈"。由于物联网以互联网为基础,同时具有其自身层次架构和技术特点。因此,物联网面临比互联网更为严峻的安全性威胁。文章首先给出了军事物联网的层次架构,并对军事物联网自身存在的安全性缺陷进行了分析,最后给出了针对军事物联网的典型攻击技术。 How to ensure information security is bottleneck for the application of military IOT (internet of thing).As IOT is based on internet and has itself technical feature, the security threaten suffer to IOT is more complicated than internet. This paper ifrstly analyze the security threaten suffer to IOT, and then proposed the typical attack method according to military IOT.
作者 杜英 刘会英
机构地区 装甲兵学院
出处 《无线互联科技》 2015年第14期53-54,60,共3页 Wireless Internet Technology
关键词 军事物联网 网络攻击技术 网络对抗 military IOT internet Attack Method internet countermeasure
  • 相关文献

参考文献5

二级参考文献80

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 3UIT. ITU Internet Reports 2005 :The Intemet of Things[ R ]. 2005.
  • 4SHA Lui, GOPALAKRISHNAN S, LIU Xue, et al. Cyber-Physical Systems:A New Frontier[ C ] //2008 IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing ( sute 2008 ). June 2008 : 1 - 9.
  • 5WOLF W. Cyber-physical Systems [ J ]. Computer, 2009,42 ( 3 ) : 88 - 89.
  • 6EASWARAN A, LEE Insup. Compositional schedulability analysis for cyber-physical systems [ J ]. 5IGBED Review, 2008,5 ( 1 ) : 11 - 12.
  • 7TAN Ying, GODDARD S, PEREZ L C. A prototype architecture for cyber-physical systems [ J ]. SIGBED Review,2008,5 ( 1 ) : 51 - 52.
  • 8President' s Council of Advisors on Science and Technology. Leadership Under Challenge: Information Technology R&D in a Competitive World, An Assessment of the Federal Networking and Information Technology R&D Program [ EB/OL ]. [ 2007-08-30]. http:// ostp. gov/pdf/nitrd_review. pdf.
  • 9YAN Bo, HUANG Guangwen. Supply chain information transmission based on RFID and internet of things [ C ] //ISECS International Colloquium on Computing, Communication, Control and Management. 2009,4 : 166 - 169.
  • 10YAN Bo, HUANG Guangwen. Application of RFID and Internet of Things in Monitoring and Anti-counterfeiting for Products [ C ]//roc of International Seminar on Business and Information Management. 2008,1 : 392 - 395.

共引文献713

同被引文献7

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部