期刊文献+

物联网在森林管理中的安全问题及防护措施 被引量:5

Security problems of Internet of Things of forest management and its protective measures
在线阅读 下载PDF
导出
摘要 随着物联网的迅速发展,应用领域不断拓宽,安全问题越发突出,森林管理物联网也存在安全问题。为了应对物联网目前存在的安全威胁,为森林管理物联网的安全与隐私保护提供理论参考,总结了物联网面临的安全威胁及相应安全措施。根据物联网目前主流体系架构,分别从感知层、传输层和应用层对安全威胁进行研究,分析了物联网在森林管理中安全需求和面临的安全问题,研究了物联网在森林管理中的安全模型,并对物联网的安全机制进行了探讨,针对各类安全威胁给出了相应的安全措施及建议。 With the development of Internet of Things,its application fields are still expanding constantly,especially the net security problem has became more and more severe in forest management.In order to respond to various security threats on Internet of Things,and provide a theoretical reference of security and privacy protection for existing forest management Internet of Things,the Internet of Things security threats and the corresponding measures were put forward.According to the mainstream system frame of Internet of Things,the security threats from perception layer,transport layer and application layer were studied respectively.Moreover,the network security,networking security model and network security mechanisms of forest management system were taken into account,the corresponding safety measures and recommendations for all kinds of security threats were given.
出处 《中南林业科技大学学报》 CAS CSCD 北大核心 2012年第9期78-80,共3页 Journal of Central South University of Forestry & Technology
基金 湖南省自然科学基金资助项目(10JJ5066)
关键词 物联网 森林管理 信息安全 Internet of Things forest management information security
  • 相关文献

参考文献8

  • 1International Telecommunication Union. The Internet of Things [R]. ITU Report, 2005.
  • 2Medaglia C M, Serbanat I A. An overview of privacy and security issues in the Interact of Things [C]// Proceedings of the 20th Tyrrhenian Workshop on Digital Communication. Sardinia, Italy: Springer press, 2010:389 - 395.
  • 3WebER R H. Internet of Things-New security and privacy challenges [J]. Computer Law & Security Review, 2010, 26:23- 30.
  • 4Leusse P, Periorell I P, Dimit rakos T. Self-managed security cell, a security model for the Internet of Things and services[C]// Proceedings of the 1st International Conference on Advances in Future Internet. Athens/Glyf ada, Greece:IEEE, 2009: 47-52.
  • 5Mulligan G. The Internet of Things: Hers now and coming soon [J]. IEEE Intemet Computing, 2010, 14(1), 1: 35- 36.
  • 6Hamad F, Smalov L, James A. Energy-aw are security in commerce and the Internet of Things [J]. Technical review(1ETE), 2009, 26(5):357-362,.
  • 7杨光,耿贵宁,都婧,刘照辉,韩鹤.物联网安全威胁与措施[J].清华大学学报(自然科学版),2011,51(10):1335-1340. 被引量:100
  • 8王建宙.从互联网到“物联网”[J].通信世界,2009(33). 被引量:10

二级参考文献27

  • 1Medaglia C M, Serbanati A. An overview of privacy and security issues in the Internet of things [C]// Proceedings of the 20th Tyrrhenian Workshop on Digital Communications. Sardinia, Italy: Springer, 2010:389-395.
  • 2Leusse P, Periorellis P, Dimitrakos T. Self managed security cell, a security model for the Internet of Things and services [C]// Proceedings of the 1st International Conference on Advances in Future Internet. Athens/Glyfada, Greece: IEEE, 2009: 47-52.
  • 3Hamad F, Smalov L, James A. Energy-aware security in M commerce and the Internet of Things[J].IETE Technical review, 2009, 26(5) : 357 - 362.
  • 4Juels A. RFID security and privacy: A research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) :381 - 394.
  • 5Weber R H. Internet of Things New security and privacy challenges [J]. Computer Law & Security Reviezo, 2010, 26(1): 23-30.
  • 6CHEN Xiangqian, Makki K, Yen K, et al. Sensor network security: A survey [J]. IEEE communications Surveys Tutorials, 2009, 11(2) : 52 - 73.
  • 7Asrar I. Could sexy space be the birth of the sms botnet? [Z/OL]. (2010-10-16), http: //www. symantec, corn/connect/ blogs/could-sexy-space-be-birth-sms-botnet.
  • 8Karygiannis T, Eydt B, Barber B, et al. Guidance for securing radio frequency identification (RFID) systems [Z/OL]. (2010-10-16), http: //www. google, com. hk/url? sa = t&source- web&cd = 1&ved -- 0CCIQFjAA&url = http%3A%2F%2Fwww, rfidsecurityalliance, org%2Fdocs %2FDraft SP800-98%2520-%2520Guidance%2520for%2520 Securing%2520RFID. pdf&ret = j%q -- XSBlaN5D X 09Guidance% 20for% 20Securing%20Radio% 20Frequency %20Identification%20(RFID) %20Systems. &ei = vxhwTqbYLa 64iAfk2LCtCQ&usg = AFQjCNGoB6IJZ12KcFBUkWh_ 5PWGkOQSpg&cad- rjt.
  • 9Eschenauer L, Gligor V. A key management scheme for distributed sensor networks [C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. New York, USA: Association for Computing Machinery, 2002, 41 - 47.
  • 10ZHANG Wensheng, Tran M. A random perturbation-based scheme for pairwise key establishment in sensor networks [C]// Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing. New York, USA: Association for Computing Machinery, 2007: 90 - 99.

共引文献107

同被引文献21

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部