期刊文献+

物联网安全架构与关键技术 被引量:11

Security architecture and technology in the Internet of things
在线阅读 下载PDF
导出
摘要 从信息安全的机密性、完整性和可用性等三个基本属性出发,分析了物联网安全需求和面临的安全问题,提出了物联网安全的系统架构,并对一些安全关键技术进行了深入研究,希望为建立物联网可靠的信息安全体系提供参考依据。 Based on confidentiality,integrity and availability,this paper analyzes the security demand and problems in IoT.It proposes a security framework and discusses some techniques in depth,expecting to offer a reference for the establishment of reliable security systems of information for the IoT in the future.
作者 李志清
出处 《微型机与应用》 2011年第9期54-56,共3页 Microcomputer & Its Applications
关键词 物联网 信息安全 安全架构 密钥管理机制 安全路由协议 Internet of things information security security architecture key management mechanism secure routing protocol
  • 相关文献

参考文献13

  • 1International Telecommunication Union. The Internet of things[R]. ITU Report,2005.
  • 2ITU. The Internet of Things [EB/OL]. http://www.itu.int/ intemetofthings, [2010-07-03].
  • 3王小妮,魏桂英.物联网RFID系统数据传输中密码算法的研究[J].北京信息科技大学学报(自然科学版),2009,24(4):75-78. 被引量:25
  • 4WEBER R H. Internet of Things-new security and privacy challenges [J]. Computer Law & Security Review, 2010, (26) : 23-30.
  • 5LEUSSE P, PERIORELLIS P, DIM ITRAKOST, et al. Self managed security cell, a security model for the Internet of Things and Services [C]. Proceedings of the 2009 First International Conference on Advances in Future Internet. Piscataway: IEEE, 2009: 47-52.
  • 6MULLIGAN G. The Internet of Things: here now and coming soon[J]. IEEE Intemet Computing,2010,14(1):36-37.
  • 7HAMAD F, SMALOV L, JAMES A. Energy-aw are security in commerce and the Internet of things [J]. IEEE, Technical Review, 2009, 26(5):357-362.
  • 8王建宙.从互联网到“物联网”[J].通信世界,2009(33). 被引量:10
  • 9裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:97
  • 10WATRO R, KONG D. Tiny PK: securing sensor networks with public key technology [C]. Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, New York: ACM press, 2004:59-64.

二级参考文献77

  • 1刘志宏,马建峰,黄启萍.基于区域的无线传感器网络密钥管理[J].计算机学报,2006,29(9):1608-1616. 被引量:27
  • 2王良民,马建峰,王超.无线传感器网络拓扑的容错度与容侵度[J].电子学报,2006,34(8):1446-1451. 被引量:21
  • 3黄海平,王汝传,孙力娟,陈志.基于密钥联系表的无线传感器网络密钥管理方案[J].通信学报,2006,27(10):13-18. 被引量:8
  • 4沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 5Liu D,Ning P,Li R.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77.
  • 6Du W,et al.A pairwise key predistribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258.
  • 7Anderson R,Kuhn M.Tamper resistance-a cautionary note[A].Proceedings of the 2nd Usenix Workshop on Electronic Commerce[C].Washington DC,USA:ACM Press,1996.1-11.
  • 8Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].Washington DC,USA:ACM Press,2002.41-47.
  • 9Pietro R D,Mancini L V,Andmei A.Random key assignment for secure wireless sensor networks[A].ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN'03)[C].Washington DC,USA:ACM Press,2003.62-71.
  • 10Chan H,et al.Random key predistribution schemes for sensor networks[A].IEEE symposium on Research in Security and Privacy[C].New York:IEEE publishing,2003.197-213.

共引文献183

同被引文献39

引证文献11

二级引证文献136

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部