期刊文献+

基于区块链的动力环境监控网络安全设计

The Security Design of Power Environment Centralized Monitoring Network Based on Block Chain
下载PDF
导出
摘要 随着IoT技术不断发展与成熟,动力环境集中监控网络(以下简称动环监控网络)化日趋明显,同时,在当前国内外形势不断发生深刻变化的背景下,动环监控网络边缘节点安全性问题日益突出。为了提升其安全性,文中先对动环监控网络安全性进行了层次上的划分,简单探讨了当前安全解决方案,并结合区块链技术,提出了一种动环监控网络安全设计解决方案。 With the continuous development and maturity of IOT technology,the power environment centralized monitoring network(PECMN,hereinafter referred to as power environment monitoring network,PEMN)is becoming increasingly obvious.At the same time,under the background of profound changes in the current situation at home and abroad,the security problem of power environment monitoring network edge nodes is increasingly prominent.In order to improve its security,this paper first divides the security of power environment monitoring network on the level,and briefly discusses the current security solutions.Combined with the blockchain technology,a power environment monitoring network security design solution is proposed.
作者 李浩 唐勇 LI Hao;TANG Yong(China Mobile Group Guangxi Co.,Ltd.,Nanning 530200,China;China Mobile Group Guangxi Co.,Ltd.,Guilin Branch,Guilin 541004,China)
出处 《通信电源技术》 2020年第S01期448-451,共4页 Telecom Power Technology
关键词 区块链 物联网 动力环境集中监控网络 安全 blockchain internet of things power environment centralized monitoring network security
  • 相关文献

参考文献2

二级参考文献10

  • 1Arora D,,Ravi S,Raghunathan A,et al.Secure Em-bedded Processing through Hardware-assisted Runtime Monitoring[].ProcACM/IEEE DesignAuto-mationand Test in Europe(DATE).2005
  • 2Collberg C S,Thomborson C.Watermarking,Tamper-proofing,and Obfuscation-tools for Software Protection[].IEEE Tans Software Eng.2002
  • 3Edward Suh G,JaeWook Lee,Srinivas Devadas.Se-cure Program Execution via Dynamic Information Flow Tracking. Technical Report,MIT LCS TR-912 . 2003
  • 4Kiriansky V,Bruening D,Amarasinghe S P.Secure Ex-ecution Via Program Shepherding[].Proceedings of theth USENIX Security Symposium.2002
  • 5Smith S,Weingart S.Building A High-performance Programmable Secure Coprocessor[].The International Journal of Computer and Telecommunications Networking.1999
  • 6Neville-neil G V.Programming Without A net[].ACM Queue:Tomorrow s Computing Today.2003
  • 7Arora D,Raghunathan A,Ravi S.Enhancing Security Through Hardware-assisted Run-time Validation of Program Data Properties[].Proc ACM/IEEE Inter-national Conference on Hardware Software Co-design and System Synthesis(CODES+ISSS).2005
  • 8Ravi,S,Raghunathan,A,Kocher,P,Hattangady,S.Security in Embedded Systems:Design Challenges[].ACMTransactions on Embedded Computing Systems.2004
  • 9Shuo Chen,,Zb ign iew Kalbarczyk,Jun Xu,RavishankarK Iyer.A Data-D riven F in ite State Mach ine Model for Analyzing Security Vu lnerab ili-ties[].DSN.2003
  • 10HORNE B,MATHESON L,SHEEHAN C.Dynamic self-checkingtechniques for improved tamper resistance[].Proc of Security andPrivacy in Digital Rights Management.2001

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部