期刊文献+

物联网安全特征与关键技术 被引量:131

Security Characteristic and Technology in the Internet of Things
在线阅读 下载PDF
导出
摘要 物联网的安全与隐私保护问题直接关系到物联网服务能否得到真正的实际推广应用,从信息安全的机密性、完整性和可用性等三个基本属性出发,分析了物联网安全的特征和面临的安全问题,讨论了物联网安全的系统架构,以及一些安全关键技术,包括密钥管理、认证与访问控制、安全路由、隐私保护、入侵检测与容错容侵等,对其中的密钥管理和路由技术进行了较详细的讨论。 Security and privacy are key issues for application in Internet of Things. Based on confidentiality, integrity and availability, this paper analyzes the security characteristics and problems in lOT. It discusses a framework and some techniques, including the key management, authentication, access control, security routing, privacy protecting, intrusion detecting and tolerance.
出处 《南京邮电大学学报(自然科学版)》 2010年第4期20-29,共10页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家重点基础研究发展计划(973计划)(2011CB302903) 国家自然科学基金(60873231) 江苏省自然科学基金(BK2009426) 江苏省高校自然科学基金(08KJB520006) 江苏省普通高校研究生科研创新计划(CX09B_151Z)资助项目
关键词 物联网 网络安全 信息安全 the Internet of Things information security network security
  • 相关文献

参考文献42

  • 1http://www.epcglobalinc.org/.
  • 2CONTI J P.The Internet of things[J].Communications Engineer,2006,4(6):20-25.
  • 3ITU.The Internet of Things.[EB/OL].(2005-12-17)[2010-07-03].http:∥www.itu.int/internetofthings.
  • 4王小妮,魏桂英.物联网RFID系统数据传输中密码算法的研究[J].北京信息科技大学学报(自然科学版),2009,24(4):75-78. 被引量:25
  • 5宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 6WEBER R H,Internet of Things-New security and privacy challenges[J].Computer Law & Security Review,2010,26:23-30.
  • 7LEUSSE P,PERIORELLIS P,DIMITRAKOS T,et al.Self Managed Security Cell,a security model for the Internet of Things and Services[C]∥Proc of the 2009 First International Conference on Advances in Future Internet.Piscataway:IEEE,2009,47-52.
  • 8MULLIGAN G.The Internet of Things:Here Now and Coming Soon[J].Internet Computing,2010,1:36-37.
  • 9HAMAD F,SMALOV L,JAMES A.Energy-aware security in M-commerce and the Internet of Things[J].IETE,Technical review,2009,26(5):357-362.
  • 10WATRO R,KONG D,et al.TinyPK:Securing sensor networks with public key technology[C]∥ Proc of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM press,2004:59-64.

二级参考文献27

  • 1WilliamStallings著 胡成松等译.SNMP网络管理[m].北京:中国电力出版社,2001..
  • 2Liu D,Ning P,Li R.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77.
  • 3Du W,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258.
  • 4Anderson R,Kuhn M.Tamper resistance-a cautionary note[A].Proceedings of the 2nd Usenix Workshop on Electronic Commerce[C].Washington DC,USA:ACM Press,1996.1-11.
  • 5Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington DC,USA:ACM Press,2002.41-47.
  • 6Pietro R D,Mancini L V,Andmei A.Random key assignment for secure wireless sensor networks[A].ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03)[C].Washington DC,USA:ACM Press,2003.62-71.
  • 7Chan H,et al.Random key predistribution schemes for sensor networks[A].IEEE symposium on Research in Security and Privacy[C].New York:IEEE publishing,2003.197-213.
  • 8Gura N,et al.Elliptic curve cryptography and RSA on 8-bit CPUs[A].Proceedings of the Workshop on Cryptography Hardware and Embedded Systems(CHES 2004)[C].Berlin:Springer-Verlag,2004.11-13.
  • 9Liu D,Ning P.Multi-level μTESLA:broadcast authentication for distributed sensor networks[J].ACM Transactions in Embedded Computing Systems (TECS),2004,3(4):800-836.
  • 10Shamir A.Identity-based cryptography and signature schemes[A].Advances in Cryptology,CRYPTO'84,Lecture Notes in Computer Science[C].Berlin:Springer-Verlag,1985,196:47-53.

共引文献230

同被引文献717

引证文献131

二级引证文献651

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部