期刊文献+

物联网的安全威胁及需求分析 被引量:3

Security Threat and Protection Analysis on Internet of Things
下载PDF
导出
摘要 物联网分布范围的广泛性、节点的移动性以及业务应用的复杂性给物联网的安全带来严峻挑战。根据物联网的架构和特点,划分物联网的安全体系,并分析了不同层面所面临的多种安全问题。分别从物联网末端节点、感知层、网络层、应用层、管理控制五个层面全面分析了物联网可能面临的多种安全威胁,并在此基础上提出了物联网面临的安全需求。 Internet of Things features a widely spread network with numerous end devices and varied applications.These features impose great security problems for IoT.This paper analyzed the characteristics of IoT security threats and proposed the architecture of IoT security system.Detailed security threats were analyzed for the end device,sensing layer,network layer,application layer,and management system of IoT.Security requirements of each layer were summarized at the end of this paper.
出处 《信息技术与标准化》 2011年第5期45-49,共5页 Information Technology & Standardization
基金 国家科技重大专项"传感器网络标准化与测试验证平台研究"(项目编号:2009ZX03006-002)
关键词 物联网 安全威胁 安全需求 传感器网络 internet of things security threat security requirement sensor network
  • 相关文献

参考文献3

  • 1Harald Sundmaeker, Patrick Guillemin, Peter Friess, Sylvie Woelffl 6. Vision and Challenges for Realizing the Internet of Things. European Commission - Information Society and Media, March 2010:11-23.
  • 2INFSO D.4 NETWORKED ENTERPRISE & RFID INFSO G.2 MICRO & NANOSYSTEMS in co- operation with the WORKING GROUP RFID OF THE ETP EPOSS. Internet of Things in 2020-ROADMAP FOR THE FUTURE. European Commission- Information Society and Media, Version 1.1-27 May 2008:4-9.
  • 3杨庚,许建,陈伟,祁正华,王海勇.物联网安全特征与关键技术[J].南京邮电大学学报(自然科学版),2010,30(4):20-29. 被引量:131

二级参考文献42

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 3http://www.epcglobalinc.org/.
  • 4HAMAD F,SMALOV L,JAMES A.Energy-aware security in M-commerce and the Internet of Things[J].IETE,Technical review,2009,26(5):357-362.
  • 5WATRO R,KONG D,et al.TinyPK:Securing sensor networks with public key technology[C]∥ Proc of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM press,2004:59-64.
  • 6BENENSON Z,GEDICKE N,RAIVIO O.Realizing robust user authentication in sensor networks[C]∥Proc of the Workshop on Real-World Wireless Sensor Networks(REALWSN 2005).[S.l.]:Stockholm,2005.135-142.
  • 7MALAN D J,WELSH M,SMITH M D.A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C]∥ 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks.Piscataway:IEEE,2004:71-80.
  • 8OUADJAOUT A,CHALLAL Y,LASLA N,et al.SEIF:Secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks[C]∥Proc of the Third International Conference on Availability,Reliability and Security(ARES 2008).Piscataway:IEEE,2008:503-508.
  • 9MA R,XING L D,MICHEL H E.A new mechanism for achieving secure and reliable data transmission in wireless sensor networks[C]∥Proc of the 2007 IEEE Conference on Technologies for Homeland Security:Enhancing Critical Infrastructure Dependability.Piscataway:IEEE,2007:274-279.
  • 10DENG Jing,HAN R,MISHRA S.Insens:Intrusion tolerant routing for wireless sensor networks[J].Computer Communications,2006,29(2):216-230.

共引文献130

同被引文献12

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部