期刊文献+

物联网安全挑战与关键技术分析 被引量:5

Analysis on the security challenges and key technologies of Internet of Things
下载PDF
导出
摘要 科学有效分析物联网安全关键技术,增强其在现实生活中应用的有效性和合理性,将能更好推进物联网和社会众多行业的健康发展。文章主要从物联网的基本情况分析入手,重点介绍其内涵、应用特征以及对于安全的需求,并阐明了物联网安全技术应用过程中面对的挑战问题,提出了一些科学有效的应对和优化措施,为全面有效推进物联网行业的稳定健康发展提供一定借鉴和参考。 The scientific and effective analysis of the key technologies of Internet of Things security, enhance its application in real life,the validity and rationality, will be able to better promote networking and healthy development of society in many industries. This papermainly analyzes the basic situation from the network, introduces the connotation, characteristics and application of the demand for safety,and illustrates the challenges facing the networking security technology in the application process, and puts forward some scientific andeffective coping and optimization measures. To provide some reference and reference for the comprehensive and effective promotion of thestable and healthy development of the Internet of Things industry.
作者 王清波 Wang Qingbo(Vocational and Technical College, Dezhou 253000, China)
出处 《无线互联科技》 2019年第1期30-31,共2页 Wireless Internet Technology
关键词 物联网 安全关键技术 挑战 优化措施 Internet of Things safety critical technologies challenges optimization measures
  • 相关文献

参考文献3

二级参考文献22

  • 1Beresford, Alastair R.,Stajano, Frank.Location privacy in pervasive computing. IEEE Pervasive Computing . 2003
  • 2Bellovin S M,Merritt M.Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1992
  • 3Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-EUROCRYPT’03 . 2003
  • 4Rolf H. Weber.Internet of Things – New security and privacy challenges[J]. Computer Law and Security Review: The International Journal of Technology and Practice . 2010 (1)
  • 5Benjamin Fabian,Oliver Günther.Security challenges of the EPCglobal network[J]. Communications of the ACM . 2009 (7)
  • 6Dibyendu Chakrabarti,Subhamoy Maitra,Bimal Roy.A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design[J]. International Journal of Information Security . 2006 (2)
  • 7Juels A,Rivest RL,Szydlo M.The blocker tag:Selective blocking of RFID tags for consumer privacy. Proceedings of the 10th ACM Conference on Computerand Communications Security(CCS 2003) . 2003
  • 8BAUER K,LEE H.A distributed authentication scheme for a wire-less sensing system. ACM Transactions on Information and Sys-tem Security . 2008
  • 9Bellare M,Canetti R,Krawczyk H.Keyed Hash Functions and Message Authentication. Advances in Cryptology-CRYPIO’96 . 1996
  • 10C.Floerkemeier,M.Langheinrich,E.Fleisch,F.Mattern,S.E.Sarma."The Internet of Things,". First international conference,IOT 2008 . 2008

共引文献80

同被引文献22

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部