期刊文献+

新型基础设施支撑的物联网服务的安全分析 被引量:1

Analysis of the Security of Io T Services Supported by New Infrastructure
下载PDF
导出
摘要 随着云计算、物联网和运营商网络的快速发展,可预计未来10年各类新型基础设施的融合会成为一个明显的趋势。首先介绍支撑未来10年内的新物联网应用的基础设施及其关键技术,然后讨论这些基础设施给物联网应用带来的安全挑战,最终给出一些应对策略。 With the rapid development of cloud computing,Internet of Things and operator networks,it is predicted that the convergence of various new infrastructures will become an obvious trend in the next decade or so.Firstly it introduces the infrastructure and key technologies supporting the new Internet of Things applications in the next decade,then discusses the security challenges brought by these infrastructures to Internet of Things applications,and finally gives some countermeasures.
作者 刘文懋 雷新 Liu Wenmao;Lei Xin(Nsfocus Information Technology Co.,Ltd.,Beijing 100191,China)
出处 《邮电设计技术》 2019年第4期58-62,共5页 Designing Techniques of Posts and Telecommunications
关键词 物联网安全 5G 边缘计算 云计算 IoT Security 5G Edge computing Cloud computing
  • 相关文献

参考文献2

二级参考文献23

  • 1Beresford, Alastair R.,Stajano, Frank.Location privacy in pervasive computing. IEEE Pervasive Computing . 2003
  • 2Bellovin S M,Merritt M.Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1992
  • 3Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-EUROCRYPT’03 . 2003
  • 4Rolf H. Weber.Internet of Things – New security and privacy challenges[J]. Computer Law and Security Review: The International Journal of Technology and Practice . 2010 (1)
  • 5Benjamin Fabian,Oliver Günther.Security challenges of the EPCglobal network[J]. Communications of the ACM . 2009 (7)
  • 6Dibyendu Chakrabarti,Subhamoy Maitra,Bimal Roy.A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design[J]. International Journal of Information Security . 2006 (2)
  • 7Juels A,Rivest RL,Szydlo M.The blocker tag:Selective blocking of RFID tags for consumer privacy. Proceedings of the 10th ACM Conference on Computerand Communications Security(CCS 2003) . 2003
  • 8BAUER K,LEE H.A distributed authentication scheme for a wire-less sensing system. ACM Transactions on Information and Sys-tem Security . 2008
  • 9Bellare M,Canetti R,Krawczyk H.Keyed Hash Functions and Message Authentication. Advances in Cryptology-CRYPIO’96 . 1996
  • 10C.Floerkemeier,M.Langheinrich,E.Fleisch,F.Mattern,S.E.Sarma."The Internet of Things,". First international conference,IOT 2008 . 2008

共引文献74

同被引文献4

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部