期刊文献+

一种基于隐私安全保护的物联网架构体系研究 被引量:5

Research on the architecture of Internet of things based on privacy protection
下载PDF
导出
摘要 对于当前社会中,由于物联网技术的发展推广,提升物联网信息安全,优化构建物联网体系,已成为亟待解决的问题;本篇基于隐私安全保护策略,从需求分析、架构方案设计等方面,优化设计物联网架构体系,确保保证物联网中的隐私信息安全。结果表明,在物联网架构体系中,运用隐私安全保护策略,能够提升物联网数据隐私安全,保护物联网系统不被攻击,保护用户信息不被攻击,提升物联网安全性,提升20.0%,发挥积极影响。结论证实,优化构建基于隐私安全保护的物联网架构体系,在保护物联网系统运用安全及用户隐私安全方面,发挥积极意义。 In current society, due to the development and promotion of Internet of things technology, enhance the network information security , to build and optimize the architecture of the Internet of things, has become a problem to be solved;this article on privacy protection strategy, from requirement analysis, architecture design, optimization design of network architecture system, to ensure that the privacy of Internet of things in the information security assurance. The results showed that in the network architecture, using privacy protection strategy, to enhance networking data security and privacy, protection system of Internet of things will not be attacked and protect user information will not be attacked and enhance the networking security, enhance 20.0%, exert a positive influence. It is concluded that the optimization of the Internet of things architecture based on privacy and security protection, in the protection of Internet of things system application security and user privacy security, play a positive significance.
作者 刘智慧
机构地区 西安外事学院
出处 《电子设计工程》 2017年第14期115-118,共4页 Electronic Design Engineering
关键词 安全保护 隐私 架构体系 物联网 security protection privacy architecture internet of things
  • 相关文献

参考文献14

二级参考文献185

  • 1曹珍富.密码学的新发展[J].四川大学学报(工程科学版),2015,47(1):1-12. 被引量:27
  • 2宁焕生,王炳辉.RFID重大工程与国家物联网[M].北京:机械工业出版社,2008.
  • 3DomingcFerrer J. Coprivacy: an introduction to the theory and applications of ccoperative privacy[J]. SORT: statistics and o- perations research transactions, 2011 : 25-40.
  • 4Buttydn L, Hubaux J P. Security and cooperation in wireless networks[M]. Cambridge Univpr, 2007.
  • 5Lin X, Sun X, Wang X, et al. TSVC: Timed efficient and secure vehicular communications with privacy preserving [J]. IEEE Transactions on Wireless Communications, 2008, 7 ( 12 ) : 4987- 4998.
  • 6Boldyreva A, Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights[J]. IACR ePrint Ar- chive: Report, 2003,25 : 57-115.
  • 7Hubaux J P, Capkun S, Luo J. The security and privacy of smart vehicles[J]. IEEE Security Privacy Magazine, 2004,2 (3) :49- 55.
  • 8Raya M, Hubaux J P. The security of vehicular ad hoc networks [C]//SASN' 05 Proceedings of the 3rd ACM Workshop on Se- curity of ad hoc and Sensor networks. ACM, 2005,1:21-31.
  • 9D6tzer F. Privacy issues in vehicular ad hoc networks[C]//PET '05 Proceedings of the 5th International Conference on Privacy Enhancing Technologies. Springer, 2006:197-209.
  • 10Papadimitratos P, Buttyan L, Hubaux J P, et al. Architecture for secure and private vehicular communications[C]//7th Interna- tion Conference on ITS TElecommunications (ITST 2007 ). IEIEE, 2007.

共引文献164

同被引文献32

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部