期刊文献+

物联网安全和隐私保护技术研究 被引量:2

Research on Security and Privacy Protection Technology of Internet of Things
下载PDF
导出
摘要 物联网的前景在业界一直被看好,但这种新型的信息技术对通信的安全性和信息的隐私性提出了新的挑战。如何保护物与物、端到端的传输通信安全成为物联网技术面临的关键问题之一。基于此,在介绍了物联网基本概念和发展的基础上,重点分析了当前物联网主流技术方面存在的安全和隐私问题,并从技术和法律角度提供了一些解决方案。 The future of the Internet of things has always been promising in the industry,but this new information technology poses new challenges to the security of communication and the privacy of information.How to protect the security of transport and communication between objects and end-to-end has become one of the key issues of Internet of things technology.On the basis of introducing the basic concepts and development of the Internet of things,this paper focuses on the security and privacy problems existing in the mainstream technology of the Internet of things,and provides some solutions from the technical and legal perspectives.
作者 顾清 沈杰 关光 严军辉 Gu Qing;Shen Jie;Guan Guang;Yan Junhui(State Nuclear Power Plant Service Company, Shanghai 200233, China)
出处 《信息与电脑》 2018年第23期187-191,196,共6页 Information & Computer
关键词 物联网 安全 隐私 射频识别 Internet of things security privacy radio frequency identification
  • 相关文献

参考文献8

二级参考文献72

  • 1Medaglia C M, Serbanati A. An overview of privacy and security issues in the Internet of things [C]// Proceedings of the 20th Tyrrhenian Workshop on Digital Communications. Sardinia, Italy: Springer, 2010:389-395.
  • 2Leusse P, Periorellis P, Dimitrakos T. Self managed security cell, a security model for the Internet of Things and services [C]// Proceedings of the 1st International Conference on Advances in Future Internet. Athens/Glyfada, Greece: IEEE, 2009: 47-52.
  • 3Hamad F, Smalov L, James A. Energy-aware security in M commerce and the Internet of Things[J].IETE Technical review, 2009, 26(5) : 357 - 362.
  • 4Juels A. RFID security and privacy: A research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) :381 - 394.
  • 5Weber R H. Internet of Things New security and privacy challenges [J]. Computer Law & Security Reviezo, 2010, 26(1): 23-30.
  • 6CHEN Xiangqian, Makki K, Yen K, et al. Sensor network security: A survey [J]. IEEE communications Surveys Tutorials, 2009, 11(2) : 52 - 73.
  • 7Asrar I. Could sexy space be the birth of the sms botnet? [Z/OL]. (2010-10-16), http: //www. symantec, corn/connect/ blogs/could-sexy-space-be-birth-sms-botnet.
  • 8Karygiannis T, Eydt B, Barber B, et al. Guidance for securing radio frequency identification (RFID) systems [Z/OL]. (2010-10-16), http: //www. google, com. hk/url? sa = t&source- web&cd = 1&ved -- 0CCIQFjAA&url = http%3A%2F%2Fwww, rfidsecurityalliance, org%2Fdocs %2FDraft SP800-98%2520-%2520Guidance%2520for%2520 Securing%2520RFID. pdf&ret = j%q -- XSBlaN5D X 09Guidance% 20for% 20Securing%20Radio% 20Frequency %20Identification%20(RFID) %20Systems. &ei = vxhwTqbYLa 64iAfk2LCtCQ&usg = AFQjCNGoB6IJZ12KcFBUkWh_ 5PWGkOQSpg&cad- rjt.
  • 9Eschenauer L, Gligor V. A key management scheme for distributed sensor networks [C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. New York, USA: Association for Computing Machinery, 2002, 41 - 47.
  • 10ZHANG Wensheng, Tran M. A random perturbation-based scheme for pairwise key establishment in sensor networks [C]// Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing. New York, USA: Association for Computing Machinery, 2007: 90 - 99.

共引文献211

同被引文献14

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部