期刊文献+

物联网安全初探 被引量:17

Initial Study on IOT Security
原文传递
导出
摘要 首先介绍了物联网的基本概念和物联网的三层体系结构,概括了物联网安全的新挑战和物联网安全大众化、轻量级、非对称、复杂性等主要特点,然后分别从感知层、网络层和应用层分析了物联网的安全威胁,最后提出了物联网安全体系结构。物联网安全需要对物联网感知层、网络层和应用层进行有效的安全保障,以应对其面临的安全威胁,并且还要能够对各个层次的安全防护手段进行统一的管理。 This paper first gives the concept and three-layer architecture of IOT(Internet of Things), summarizes the new security challenge to lOT and its main features including popularity, lightweight, non-symmety, complexity, and then analyzes the security threats against perception layer, network layer, application layer of lOT, and finally it gives the security architecture for IOT. The security measure should of the ability to protect perception layer, network layer, application layer of lOT, cope with the security threats of against IOT, and implement the management of all security measure.
出处 《通信技术》 2012年第7期100-102,共3页 Communications Technology
关键词 物联网 安全 安全威胁 安全体系结构 IOT(Internet of Things) security security threat security architecture
  • 相关文献

参考文献9

二级参考文献90

共引文献448

同被引文献81

  • 1孙梦梦,刘元安,刘凯明.物联网中的安全问题分析及其安全机制研究[J].保密科学技术,2011(11):61-66. 被引量:19
  • 2丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 3杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 4周晓寰,张秦艳.SAML2.0在WEB单点登录系统模型中的应用[J].科技信息,2007(4):14-16. 被引量:2
  • 5PFITZMANN B, WAIDNER M. Analysis of Liberty Single Sign-on with Enabled Clients[J]. Internet Computing, IEEE, 2003, 7(6): 25-28.
  • 6CHALANDAR E, DARVISH P, RAHMANI M. A Centralized Cookie-based Single Sign-on in Distributed Systems[C]// Information and Communication Technology 5th International Conference. 2007 : 163-165.
  • 7Shor P W. Algorithms for quantum computation: discrete logarithms and factoring[C]//35th Annual Symposium on Foundations of Computer Science, 1994:124-134.
  • 8Vandersypen L M K, Steffen M, Breyta G, eta Experimenta realization of Shor's quantum factoring algorithm using nuclear magnetic resonance[J].Nature 2001,414(6866), 883-887.
  • 9Micciancio. The short vector problem is NP-hard to approximate to within some constant[J].SIAM Journal on Computing,2007,30 (6): 2008-2035.
  • 10Micciancio D, Goldwasser S. Complexity of lattice problem[M].Kluwer Academic Publishers,2002.

引证文献17

二级引证文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部