期刊文献+

浅析物联网安全防护技术 被引量:3

Analysis on IoT Security Technology
下载PDF
导出
摘要 物联网已渗透到日常生活的方方面面,安全问题逐渐显现,安全防范的重要性不言而喻。首先简述了物联网发展的背景及运营商的物联网建设、部署和业务发展现状,结合近期物联网安全攻击事件及其影响,通过对物联网安全风险几个方面的研究,阐述分析了物联网安全现状及防范手段,最后对未来物联网安全防范技术进行展望和探讨。 IoT has been applied to all aspects of daily life,and security issues have gradually emerged. The importance of safety precautions is obvious. Firstly,the background of the development of IoT and the development status of operators' IoT construction, deployment and business are briefly described. Combined with recent IoT security attacks and their impacts,through the study of several aspects of IoT security risks,the security status and preventive measures of IoT are elaborated and analyzed. Finally,the future security prevention technology is prospected and discussed.
作者 汪襄南 王冰 霍纯敬 Wang Xiangnan;Wang Bing;Huo Chunjing(China Information Technology Designing & Consulting Institute Co.,Ltd.,Beijing 100048,China;China Unicom Beijing Branch,Beijing 100061,China)
出处 《邮电设计技术》 2019年第6期19-23,共5页 Designing Techniques of Posts and Telecommunications
关键词 物联网 网络安全 分布式拒绝服务攻击 区块链 IoT Network security DDoS Blockchain
  • 相关文献

参考文献6

二级参考文献75

  • 1吴功宜.智慧的物联网[M].北京:机械工业出版社,2010:3-4.
  • 2Medaglia C M, Serbanati A. An overview of privacy and security issues in the Internet of things [C]// Proceedings of the 20th Tyrrhenian Workshop on Digital Communications. Sardinia, Italy: Springer, 2010:389-395.
  • 3Leusse P, Periorellis P, Dimitrakos T. Self managed security cell, a security model for the Internet of Things and services [C]// Proceedings of the 1st International Conference on Advances in Future Internet. Athens/Glyfada, Greece: IEEE, 2009: 47-52.
  • 4Hamad F, Smalov L, James A. Energy-aware security in M commerce and the Internet of Things[J].IETE Technical review, 2009, 26(5) : 357 - 362.
  • 5Juels A. RFID security and privacy: A research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) :381 - 394.
  • 6Weber R H. Internet of Things New security and privacy challenges [J]. Computer Law & Security Reviezo, 2010, 26(1): 23-30.
  • 7CHEN Xiangqian, Makki K, Yen K, et al. Sensor network security: A survey [J]. IEEE communications Surveys Tutorials, 2009, 11(2) : 52 - 73.
  • 8Asrar I. Could sexy space be the birth of the sms botnet? [Z/OL]. (2010-10-16), http: //www. symantec, corn/connect/ blogs/could-sexy-space-be-birth-sms-botnet.
  • 9Karygiannis T, Eydt B, Barber B, et al. Guidance for securing radio frequency identification (RFID) systems [Z/OL]. (2010-10-16), http: //www. google, com. hk/url? sa = t&source- web&cd = 1&ved -- 0CCIQFjAA&url = http%3A%2F%2Fwww, rfidsecurityalliance, org%2Fdocs %2FDraft SP800-98%2520-%2520Guidance%2520for%2520 Securing%2520RFID. pdf&ret = j%q -- XSBlaN5D X 09Guidance% 20for% 20Securing%20Radio% 20Frequency %20Identification%20(RFID) %20Systems. &ei = vxhwTqbYLa 64iAfk2LCtCQ&usg = AFQjCNGoB6IJZ12KcFBUkWh_ 5PWGkOQSpg&cad- rjt.
  • 10Eschenauer L, Gligor V. A key management scheme for distributed sensor networks [C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. New York, USA: Association for Computing Machinery, 2002, 41 - 47.

共引文献287

同被引文献34

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部