期刊文献+

一种基于智能手机的可穿戴设备安全架构 被引量:5

A Wearable Device Security Architecture Based on Smartphone
下载PDF
导出
摘要 随着网络和传感器等技术的发展,可穿戴设备实现的功能越来越多,应用越来越广,逐渐成为一种趋势,方便了人们的信息化生活,但是其所面临的安全风险也越来越大。本文对可穿戴设备的发展现状进行了分析,提出可穿戴设备发展过程中面临的问题,最后提出一种以手机为中心的可穿戴设备安全架构。该架构以手机为中心,在手机和可穿戴设备中添加安全模块,实现加解密、用户认证和权限管理以及隐私保护。该架构可以满足可穿戴设备使用无线网络传输数据时对安全性的要求,通过设备认证和权限管理防止外部攻击,通过隐私管理实现对用户私密数据的保护。 With the rapid development of information and communication technology,device appearance and functions of information and communication products is evolving and wearable device becomes hotspot of Information and Communication Technology current and future.Everything has two sides and the more powerful and flexible things face greater security risks.This paper analyzes current development status of wearable devices and points out some problems wearable device development process faces.Finally,the author proposes Smartphone centric wearable device security architecture.The architecture centers on smart phone and adds security module in the phone and wear-able de-vices,achieve encryption,user authentication,access management and privacy protection.The architecture meets wearable device using wireless network data transmission security requirements.Device authentication and access management can prevent external attack.Privacy protection can realize protection of user privacy data.
出处 《软件》 2015年第11期105-107,共3页 Software
关键词 可穿戴设备 无线通信 安全 智能手机 Wearable device Security Smartphone Wireless network
  • 相关文献

参考文献9

  • 1TAN Li,CHEN Yami,LI Yizhe,et al.Q-learning based Cognitive Wireless Network access Mechanism. The Journal of New Industrialization . 2011
  • 2A.Arabo,M.Kennedy,Q.Shi,M.Merabti,D.Llewellyn-Jones,K.Kifayat.'Identity Management in System-of-Systems Crisis Management Situation,'. 6th IEEE International Conference on System of Systems Engineering So S’’E 2011 . 2011
  • 3刘万辉,杨晔.基于Android系统的温室智能监控系统的设计开发[J].软件,2013,34(5):1-3. 被引量:21
  • 4李晋丽,段小波,王琳.基于过滤驱动的安全密码框的研究与实现[J].软件,2013,34(4):19-22. 被引量:10
  • 5Hande Alemdar,Cem Ersoy.??Wireless sensor networks for healthcare: A survey(J)Computer Networks . 2010 (15)
  • 6Sukhvir Notray,Muhammad Siddiqiy,Hassan Habibi Gharakheiliy,Vijay Sivaramany,Roksana Boreli.'An Experimental Study of Security and Privacy Risks with Emerging Household Appliances'. Workshop on Security and Privacy in Machine-to-Machine ommunications (M2MSec’’14) . 2014
  • 7Kamrul Islaml,Weiming Shen,Xianbin Wang.Security and Privacy Considerations for Wireless Sensor Networks in Smart Home Environments (A). Proceedings of the 2012IEEE 16th International Conference on Computer Supported Cooperative Work in Design (C) . 2012
  • 8Jungchae Kim,Byuck jin Lee,Sun K Yoo.'Real-time Encryption Module for Secure Data Protection of Wearable Healthcare Devices'. 35th Annual International Conference of the IEEE EMBS . 2013
  • 9兰宏钟,罗红.基于ZigBee的无线传感器网络管理系统的研究与设计[J].软件,2013,34(1):30-33. 被引量:23

二级参考文献19

  • 1RUIZ L, NOGUEIRA J, LOUREIRO A. MANNA: A Management Architecture for Wireless Sensor Networks. IEEE Communications Magazine, 2003, 41(2):116-125.
  • 2SONG H, KIM D, LEE K, et al. UPnP-Based Sensor Network Management Architecture. Proceedings of the Second International Conference on Mobile Computing and Ubiquitous Networking. Japan, 2005.
  • 3LEE W, DATTA A, CARDELL O. WinMS: Wireless Sensor network-Management system, An Adaptive Policy- based Management for Wireless Sensor Networks. UWA- CSSE-06-OOl: Australia, The University of Western Australia, 2006.
  • 4WAGENKNECHT G, ANWANDER M, BRAUN T, et al.MARWIS: A Mmagement Architecture for Heterogeneous Wireless Sensor Networks. Harju J,eds. Proceedings of the 6th International Conference on Wired/ Wireless Internet Communications. Berlin: Springer- verlag, 2008: 177-188.
  • 5RonaldD.Reeves.Windows7设备驱动程序开发[M].张猛,纪小玲,周姝嫣.北京:人民邮电出版社,2012.
  • 6Ed Burnette. Hello, Android: Introducing Google's Mobile DevelopmentPlatform[M]. American: Pragmatic Bookshelf, 2009.
  • 7韩敬伟,李树彪.浅析WINDOWS环境下的内存分页机制[J].国外电子测量技术,2008,27(6):35-38. 被引量:2
  • 8周武斌,罗大庸.ZigBee路由协议的研究[J].计算机工程与科学,2009,31(6):12-14. 被引量:34
  • 9杨阳,赵友华.基于分层的键盘监听驱动程序的编写[J].黑客防线,2010(6):76-90. 被引量:1
  • 10耿东久,索岳,陈渝,文军,吕勇强.基于Android手机的远程访问和控制系统[J].计算机应用,2011,31(2):559-561. 被引量:143

共引文献51

同被引文献30

引证文献5

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部