期刊文献+

基于物联网感知层信息安全传输策略研究 被引量:2

下载PDF
导出
摘要 本文分析了传统物联网中信息传输存在的安全问题,然后提出利用MD5算法、对称密钥体制和非对称密钥体制来对感知层节点之间的信息传输进行保护,从而让物联网感知层的信息传输更加的安全、可靠和高效.
作者 卢炼
出处 《四川职业技术学院学报》 2015年第6期142-144,148,共4页 Journal of Sichuan Vocational and Technical College
  • 相关文献

参考文献3

二级参考文献52

  • 1Van Kranenburg R.The Intemet of Things.Amsterdam:Waag Society,2008.
  • 2Yan L,Zhang Y,Yang L T.The Intemet of Things:From RFID to the Next.Generation Pervasive Networked Systems.Auerbach Publications,2008.
  • 3Chakrabarti D,Maitra S,Roy B.A Key Predistribution Scheme for Wireless Sensor Networks:Merging Blocks in Combinatorial Design.Journal of Information Security,2006,5(2):105-114.
  • 4International Telecommunication Union.ITU Internet Reports 2005:The Internet of Things,2005.
  • 5Floerkemeier C.Langheinrich M,Heisch E,Mattern F.The Internet of Things:Lecture Notes in Computer Science.Springer,2008,49-52.
  • 6Medaglia C M, Serbanati A. An overview of privacy and security issues in the Internet of things [C]// Proceedings of the 20th Tyrrhenian Workshop on Digital Communications. Sardinia, Italy: Springer, 2010:389-395.
  • 7Leusse P, Periorellis P, Dimitrakos T. Self managed security cell, a security model for the Internet of Things and services [C]// Proceedings of the 1st International Conference on Advances in Future Internet. Athens/Glyfada, Greece: IEEE, 2009: 47-52.
  • 8Hamad F, Smalov L, James A. Energy-aware security in M commerce and the Internet of Things[J].IETE Technical review, 2009, 26(5) : 357 - 362.
  • 9Juels A. RFID security and privacy: A research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) :381 - 394.
  • 10Weber R H. Internet of Things New security and privacy challenges [J]. Computer Law & Security Reviezo, 2010, 26(1): 23-30.

共引文献228

同被引文献5

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部