期刊文献+

基于CC标准的物联网数据安全需求分析及应用研究 被引量:8

Demand Analysis and Application of Internet of Things Based on Common Criteria
下载PDF
导出
摘要 在物联网快速发展和应用的进程中,数据安全问题应作为首要问题加以重视。本文基于计算机安全评估标准-通用准则(Common Criteria,CC),探讨了物联网数据安全当前所面临的风险和威胁,制定了全面保障物联网数据安全必备的安全功能组件和安全保证组件。通过实例证实该方法能够反映物联网数据安全保障可能所需的产品功能,对物联网数据安全建设具有一定参考价值。 As the Internet of things is in the process of rapid development and application, data security issues should be as a top priority. This article is based on computer security evaluation Criteria - general rule (Common Criteria, CC), discusses the iot data security risks and threats faced by the current developed comprehensive Internet data security es-sential security functional components and security guarantees. Examples prove the method can reflect the iot data se-curity may be required to product features and construction of Internet data security has certain reference value.
作者 单武
出处 《软件》 2015年第8期121-127,共7页 Software
关键词 CC标准 安全需求分析 安全功能组件 安全保证组件 物联网 CC criteria Safety requirements analysis Security functional components Security components The Internet of things
  • 相关文献

参考文献8

  • 1Strategic Research Agenda(SRA).European Research Projects on the Internet of Things(CERP-IoT),Internetof things-strategic research roadmap. http://ec.europa.eu/information_society/policy/rf id/documents/in_cerp.pdf .
  • 2Commission of the European communities.Internet of Things in 2020, EPoSS, Brussels. http://www.umic.pt/images/stories/publicacoes2/Internet-of-Thi-ngs in 2010_EC-EPoSS_Workshop_Report_2008_v3.pdf . 2008
  • 3Yih-Chun Hu,Adrian Perrig,David B Johnson.Packet leashes: a defense against wormhole attacks in wireless networks. Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003) . 2003
  • 4Sachin Babar,Antoniettia Stango.Proposed Embedded Security Framework for Internet of Things(Io T). . 2011
  • 5Arijit Ukil,Jaydip Sen.Embedded Security for Internet of Things. .
  • 6Dorice Nyamy,Pascal Urien,HIP-TAG.a New Paradigm for the Internet of Things. .
  • 7Murat D,Youngwhan S.An RSSI-based scheme for Sybil attack detection in wireless sensor networks. Proceedings of the 2006Intemationa1 Symposium on a World of Wireless,Mobile and Multimedia Nerworks (Wo WMo M’’06) . 2006
  • 8Krotiris I,Dimitriou T,Giannetsos T.LIDe A:A distributed lightweight intrusion detection architecture for sensor networks. Proceedings fo the 4 th International Conference on Security and Privacy for Communication networks . 2008

同被引文献50

引证文献8

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部