期刊文献+

设计不安全:当今物联网设备的安全问题 被引量:1

Insecurity by Design: Today's Io T Device Security Problem
下载PDF
导出
摘要 要想成为一个艺术家需要具备什么素质?要成为伟大的音乐家呢?如何培育一个具有国际水准、可以运用所学专业知识承担全球重大挑战并提出有效解决方案的工程师?我们如何既在技术知识层面又在判断力和智慧层面帮助年轻人成长?从现在到2020年,为了替换将要退休的人员并驱动经济增长,英国将有近一百万个工程师与科研人员的职位空缺(数据来源:Engineering UK)。工程教育面临的挑战是不仅使学生获得技术知识和理解。 In today's technological age someone could gain access to your online bank account through a light bulb. This is due to the Intemet of Things (IoT). The loT has become a reality as more and more of our devices are being connected to the Internet. In fact, automated teller machines (ATMs) have been online for many years, and more recently we have had the installation of smart meters remotely connecting to the electricity grid. We now have smart watches and smart baby monitors, and there are many more examples of new loT devices.
出处 《Engineering》 SCIE EI 2016年第1期48-49,共2页 工程(英文)
  • 相关文献

参考文献10

  • 1Rivera J, Van der Meulen R. Gartner says 4.9 billion connected "things" will be in use in 2015 [Internet], 2014 Nov 11 [cited 2016 Feb 20]. Available from: http:[[www,gartner, comlnewsroomlid12905717.
  • 2Cisco. lnternet of things (loT) [Internet], [cited 2015 Jul 23]. Available from: http:Hwww.cisco,comlweb]solutions]trendsliotlportfotio,html.
  • 3Chapman A. Hacking into internet connected light bulbs [tnternet]. 2014 Jul 4[cited 2015 Sep 151. Available from: http:ncontextis.com/resources/blog/ hacking-internet-connected-light-bulbs.
  • 4Greenberg A, Hackers remotely kill a jeep on the highway-with me in it [Internet], Wired 2015 Ju121 [cited 2015 Sep 15]. Available from: http://www. wired.com/2015[OT /hackers-remotely-kill-jeep-highway/.
  • 5Oswald D, Paar C. Breaking Mifare DESFire MF31CD40: power analysis and templates in the real world. In: Preneel B, Takagi T, editors Cryptographic Hardware and Embedded Dystems-CHES 2011: 13th International Work- shop: 2011 Sep 28-Oct 1; Nara,Japan. Berlin: Springer; 2011. p. 207-22.
  • 6Eisenbarth T, Kasper T, Moradi A, Paar C, Salmasizadeh M, Shalmani MTM. On the power of power analysis in the real world: a complete break of the KeeLoq code hopping scheme. In: Wagner D, editor Advances in Cryptology- CRYPTO 2008: 28th Annual International Cryptology Conference; 2008 Aug 17-21.
  • 7Santa Barbara, CA, USA. Berlin: Springer; 2008, p, 203-20, Moradi A, Kasper M, Paar C, Black-box side-channel attacks highlight the im- portance of countermeasures-an analysis of the Xilinx Virtex-4 and Virtex-5 hitstream encryption mechanism. Ill: Dunkelman O, editor Topics in Cryptol- ogy-CT-RSA 2012: The Cryptographers' Track at the RSA Conference 2012; 2012 Feb 27-Mar 2; San Francisco, CA, USA, Berlin: Springer; 2012. p, 1-18.
  • 8National Security Agency, Suite B Cryptography today [lnternet]. 2015 Aug 19 [cited 2015 Sep 151. Available from: https:Hwww.nsa,govJialprograms] suiteb_cryptogra phy/index.shtml.
  • 9SAFEcrypto. About SAFEcrypto [lnternet]. [cited 2015 Sep 15]. Available from: www, sa fecrypto,eu.
  • 10Gu C, O'Neill M, Ultra-compact and robust FPGA-based PUF identification generator, In: Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS'IS); 2015 May 24-27; Lisbon, Portugal; 2015. p. 934-7.

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部