期刊文献+

物联网安全管理与技术研究 被引量:5

The research of the network security management and technology of the Internet of Things
下载PDF
导出
摘要 物联网作为信息通信技术的典型代表,在全球范围内呈现加速发展的态势。不同行业和不同类型物联网应用的普及和逐渐成熟推动物联网的发展进入万物互联的新时代,如可穿戴设备、智能家电、自动驾驶汽车、智能机器人等。与此同时,物联网安全威胁日益凸显,物联网安全研究已经成为当前热点。因此,亟需开展物联网安全管理与技术研究,为物联网的发展提供安全指导,为政府提供监管依据和策略。本文在梳理物联网发展概况的基础上,分别从管理层面和技术层面分析了物联网安全政策、标准和安全技术防护情况,并提出我国物联网安全发展的对策建议。 As a typical representative of information and communication technologies, the Internet of Things presents a trend of accelerated development on a global scale. The popularization and gradual maturity of Io T applications in different industries and different types push the development of Io T into the new era of all-things interconnection, such as wearable devices,smart appliances, autonomous vehicles and intelligent robots. Technological progress and gradual maturity of the industry has promoted the development of things into a new phase. At the same time, Io T security threats have become increasingly prominent, Io T security research has become the current hot spot. Therefore, there is an urgent need to develop Internet of Things security management and technology research, provide security guidance for the development of Internet of Things and government with regulatory basis and strategy. Faced with the above new situation, this paper analyzes the development of Io T on the basis of management and technical aspects of the Io T security policy, standards and security technology protection,and put forward China's Internet of Things security development countermeasures and suggestions.
出处 《电信网技术》 2018年第2期16-19,共4页 Telecommunications Network Technology
关键词 物联网 技术 管理 安全 Internet of Things technology management security
  • 相关文献

参考文献4

二级参考文献27

  • 1刘志宏,马建峰,黄启萍.基于区域的无线传感器网络密钥管理[J].计算机学报,2006,29(9):1608-1616. 被引量:27
  • 2O SAVRY, F VACHRAND. The lnternet of Things:20th Tyrrhe- nian Workshop on Digital Communications [M].New York: Springer, 2010. 409-418.
  • 3M FINMINO GB BRANDAO. AMG GUERREIRO, RA DEM VALENTIM.Neural Cryptography Applied to Key Management Protocol with Mutual Authentication in RFID Conference for lntemet Technology 2009). 2009:1-6. Systems[C]// Proc. of International and Secured Transactions(ICITST.
  • 4M RIEBACK, B CRISPO, and A TANENBAUM. The Evolution of RFID Security[J]. IEEE Pervasive Computing, 5(1):62 - 69, 2006.
  • 5A PERRIG, R. SZEWCZYK, JD TYGAR, V WEN, DE CULL- ERo SPINS:Security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5):521-534.
  • 6L ESCHENAUERL, VD GLIGOR. A key-management scheme for distributed sensor networks[C]// Proc. of the 9th ACM Conference on Computer and Communications Security(CCS'02). 2002: 41- 47.
  • 7H CHAN, A PERRIG, D SONG. Random key predistribution schemes for sensor networks[C]//Proc, of the 2003 IEEE Sym.On Security and Privacy. 2003. 197-213.
  • 8W DU, J DENG , YS HAN, et al. A Pair wise Key Pre-Distribn- tion Scheme for Wireless Sensor Networks[C]//Proc. of the 10th ACM Conf on Computer and Communications Security.2003.42-51.
  • 9. W DU, J DENG , YS HAN, et al. A key management scheme for wireless sensor networks using deployment knowledge[C]//Proc, of IEEE INFOCOM'04. 2004. 586-597.
  • 10D LIU, P NING. Location-based pairwise key establishments for static sensor networks[C]//Proc.of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. 2003. 72-82.

共引文献13

同被引文献19

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部