期刊文献+

基于物联网层次架构的安全接入与安全管理平台 被引量:4

IoT Security Access and Management Platform Based on the IoT Level Framework
下载PDF
导出
摘要 提出了一种基于物联网3层架构的安全技术体系。在物联网的层次架构中,"物联网安全接入平台"在网络传输层实现网络的安全接入,"物联网安全管理平台"在业务应用层实现信息的安全管理。通过这两个平台所提供的统一和集中的网络与信息安全技术支撑,以确保信息孤岛模式下的各种物联网系统都能具备必要的网络和信息安全保障。 This article presents a security technology system based on three levels framework of Io T. In the leveled fram ework of Io T,"Io T Security Access Platform"fulfill the security networks access in the layer of network transmission,"Io T Security Management Platform"fulfill the security information management in the layer of service application. Through the unified and intensive network and information security technology support provided by the two platforms, various Io T systems in the information isolated islands can get necessary security assurance of network and information.
作者 罗振 桑梓勤
出处 《电信网技术》 2016年第2期15-19,共5页 Telecommunications Network Technology
关键词 物联网 网络与信息安全 电信网 互联网 物联网业务应用 IoT security of Network and information Telecom Network Internet services and applications of IoT
  • 相关文献

参考文献4

  • 1杨庚,许建,陈伟,祁正华,王海勇.物联网安全特征与关键技术[J].南京邮电大学学报(自然科学版),2010,30(4):20-29. 被引量:131
  • 2林柏钢.物联网安全架构与服务计算安全[J].保密科学技术,2011(10).
  • 3中国通信行业标准:物联网总体框架与技术要求.YD/T2437.2012.
  • 4中国通信标准化协会标准:物联网安全需求.YDB101.2012.

二级参考文献42

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 3http://www.epcglobalinc.org/.
  • 4HAMAD F,SMALOV L,JAMES A.Energy-aware security in M-commerce and the Internet of Things[J].IETE,Technical review,2009,26(5):357-362.
  • 5WATRO R,KONG D,et al.TinyPK:Securing sensor networks with public key technology[C]∥ Proc of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM press,2004:59-64.
  • 6BENENSON Z,GEDICKE N,RAIVIO O.Realizing robust user authentication in sensor networks[C]∥Proc of the Workshop on Real-World Wireless Sensor Networks(REALWSN 2005).[S.l.]:Stockholm,2005.135-142.
  • 7MALAN D J,WELSH M,SMITH M D.A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C]∥ 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks.Piscataway:IEEE,2004:71-80.
  • 8OUADJAOUT A,CHALLAL Y,LASLA N,et al.SEIF:Secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks[C]∥Proc of the Third International Conference on Availability,Reliability and Security(ARES 2008).Piscataway:IEEE,2008:503-508.
  • 9MA R,XING L D,MICHEL H E.A new mechanism for achieving secure and reliable data transmission in wireless sensor networks[C]∥Proc of the 2007 IEEE Conference on Technologies for Homeland Security:Enhancing Critical Infrastructure Dependability.Piscataway:IEEE,2007:274-279.
  • 10DENG Jing,HAN R,MISHRA S.Insens:Intrusion tolerant routing for wireless sensor networks[J].Computer Communications,2006,29(2):216-230.

共引文献130

同被引文献13

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部