期刊文献+

物联网安全体系关键技术研究 被引量:1

下载PDF
导出
摘要 根据物联网体系结构特点,探讨物联网安全威胁;根据物联网安全架构,分析感知层、传输层和应用层的安全特征及其关键技术,以建立和健全物联网安全体系,保障物联网信息安全,促进物联网产业安全可持续发展。
作者 陈德庆
出处 《软件导刊》 2015年第11期160-162,共3页 Software Guide
  • 相关文献

参考文献10

  • 13GPP. Service requirements for machine-type communications[S]. TR 22. 368,Version 10.0.0,2010.
  • 2武传坤.物联网安全关键技术与挑战[J].密码学报,2015,2(1):40-53. 被引量:73
  • 3NL I. M,LIU Y,ZHU Y. China's national research project on wire- less senso networks[J]. IEEE Wireless Communications, 2007,14 (6) :78-83.
  • 4AKYILDIZ I F,SU W, SANKARASUBRAMANSIAM Y, et al. A survey on sensor networks[J]. IEEE Communications Magazine, 2002,40(8) : 104-112.
  • 5WEBER R H. Internet of things--new security and privacy challen- ges[J]. Computer Law Security Review, 2010,26 (1) : 23-30.
  • 6LEUSSE P, PERIORELLIS P, DIMITRAKOS T, et al. Self man- aged security cell, a security model for the internet of things and serviees[C]. In: 2009 First International Conference on Future ln- ternet. IEEE, 2009 : 47-52.
  • 7TRAUB K,ALLGAIR G,BARTHEL H,et al. The EPCglobal ar- chitecture framework [ S ]. http://www, gslhk, org/files/docu- ment/epc_standards/architecture_l_3-framework-20090319, pdf.
  • 8武传坤.物联网安全架构初探[J].中国科学院院刊,2010,25(4):411-419. 被引量:76
  • 9范红,邵华,李程远,胡志昂.物联网安全技术体系研究[J].信息网络安全,2011(9):5-8. 被引量:11
  • 10郭楠,徐全平.传感器网络技术与标准化连载(二) 传感器网络国际标准化综述[J].信息技术与标准化,2009(11):24-26. 被引量:4

二级参考文献29

  • 1Van Kranenburg R.The Intemet of Things.Amsterdam:Waag Society,2008.
  • 2Yan L,Zhang Y,Yang L T.The Intemet of Things:From RFID to the Next.Generation Pervasive Networked Systems.Auerbach Publications,2008.
  • 3Chakrabarti D,Maitra S,Roy B.A Key Predistribution Scheme for Wireless Sensor Networks:Merging Blocks in Combinatorial Design.Journal of Information Security,2006,5(2):105-114.
  • 4International Telecommunication Union.ITU Internet Reports 2005:The Internet of Things,2005.
  • 5Floerkemeier C.Langheinrich M,Heisch E,Mattern F.The Internet of Things:Lecture Notes in Computer Science.Springer,2008,49-52.
  • 6Benjamin F, Oliver G. Security Challenges of EPCglobal network [J]. Communications of the ACM-Barbara Liskov: ACM' s AM.Turing Award Winner. 2009, 52 ( 07 ): 121-125.
  • 7J.G.Alfaro, M.Barbeau and E.Kranakis. Analysis of Threats to the Security of EPC Networks [J]. 2008 Communication Networks and Services Research Conference. 2008.
  • 8GB/T25070-2010.信息安全技术信息系统等级保护安全设计技术要求[S].
  • 9Beresford, Alastair R.,Stajano, Frank.Location privacy in pervasive computing. IEEE Pervasive Computing . 2003
  • 10Bellovin S M,Merritt M.Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1992

共引文献153

同被引文献10

引证文献1

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部