共查询到18条相似文献,搜索用时 203 毫秒
1.
2.
3.
4.
虽然社会的发展和人们生活水平的日益提高,为物联网的应用和发展营造了良好的氛围,但是就目前而言物联网在发展过程中的,网络安全问题已经成为了制约物联网发展的主要问题.因此必须加大物联网网络安全措施研究的力度,才能从根本上确保物联网的安全稳定运行.本文主要是就物联网在发展过程中存在的网络安全问题进行了分析和探讨,并以此为基础提出了相应的解决对策. 相似文献
5.
电子政务网络数据库安全保护研究 总被引:1,自引:0,他引:1
文章针对电子政务网络安全问题现状进行了分析,电子政务网络环境存在物理安全、系统安全、信息安全、管理安全等众多安全隐患。随着电子政务网络信息量的越来越大,数据库系统作为电子政务信息系统的重要组成部分,其保障工作是信息安全的重点,文章主要探讨电子政务系统中数据库系统面临的安全问题,推导了安全风险概率,分析了数据库安全保护的技术环境和部分技术手段,并提出了一些建议。 相似文献
6.
7.
物联网感知层的安全是物联网安全的基础和核心.介绍了物联网的相关概念,从感知层使用的技术入手分析该层存在的安全威胁,并对现有的安全策略进行分析和总结.最后,针对现存的感知层安全问题提出了相应的建议措施. 相似文献
8.
本文通过对RFID在物联网中的重要性及其特性的阐述,详细分析了RFID系统的信息安全隐患及风险,并给出了相应的安全对策与机制,为物联网时代RFID的大规模应用提供了基础性的建议。 相似文献
9.
物联网终端设备的数量急剧增加,终端设备无人值守,终端设备本身的安全及信息传递过程中的安全无法保障,用户隐私信息被泄露等,本文将上述问题归类为物联网自身安全问题和网络应用安全问题。在介绍了物联网概念和体系结构的基础上对各种安全问题存在的原因进行了详细的分析,提出了终端设备与感知节点本地安全对策、物联网核心网络安全对策、物联网的加密机制安全对策、用户隐私安全对策。 相似文献
10.
11.
12.
Hannes Tschofenig 《Datenschutz und Datensicherheit - DuD》2016,40(4):222-224
Over the last few years Internet of Things products have become known for their weak security. News articles regularly describe security vulnerabilities of cars, surveillance cameras, kettles, and other IoT devices. There are, however, recent standardization activities addressing some of these security challenges. This article describes how the work of the IETF and the FIDO Alliance can lead to improved security. 相似文献
13.
The Internet of Things (IoT), including wireless sensors, is one of the highly anticipated contributors to big data; therefore, avoiding misleading or forged data gathering in cases of sensitive and critical data through secure communication is vital. However, due to the relatively long distance between remote cloud and end nodes, cloud computing cannot provide effective and direct management for end nodes, which leads to security vulnerabilities. In this paper, we propose a novel trust evaluation model based on the trust transitivity on a chain assisted by mobile edge nodes, which is used to ensure the reliability of nodes in the Internet of Things and prevent malicious attacks. The mobile edge nodes offer a new solution to solve the above problems with relatively strong computing and storage abilities. Firstly, we design calculation approaches to different trust chains to measure their trust degrees. Secondly, we propose an improved Dijkstra’s algorithm for collecting trust information of sensor nodes by mobile edge nodes. Finally, the experimental results show that our trust model based on mobile edge nodes can evaluate sensor nodes more precisely and enhance the security on the Internet of Things. 相似文献
14.
Several three-party password authenticated key exchange (3-PAKE) protocols have recently been proposed for heterogeneous wireless sensor networks (HWSN). These are efficient and designed to address security concerns in ad-hoc sensor network applications for a global Internet of Things framework, where a user may request access to sensitive information collected by resource-constrained sensors in clusters managed by gateway nodes. In this paper we first analyze three recently proposed 3-PAKE protocols and discuss their vulnerabilities. Then, based on Radio Frequency Identification technologies we propose a novel 3-PAKE protocol for HWSN applications, with two extensions for additional security features, that is provably secure, efficient and flexible. 相似文献
15.
Typically, Cyber-Physical Systems (CPS) involve various interconnected systems, which can monitor and manipulate real objects and processes. They are closely related to Internet of Things (IoT) systems, except that CPS focuses on the interaction between physical, networking and computation processes. Their integration with IoT led to a new CPS aspect, the Internet of Cyber-Physical Things (IoCPT). The fast and significant evolution of CPS affects various aspects in people’s way of life and enables a wider range of services and applications including e-Health, smart homes, e-Commerce, etc. However, interconnecting the cyber and physical worlds gives rise to new dangerous security challenges. Consequently, CPS security has attracted the attention of both researchers and industries. This paper surveys the main aspects of CPS and the corresponding applications, technologies, and standards. Moreover, CPS security vulnerabilities, threats and attacks are reviewed, while the key issues and challenges are identified. Additionally, the existing security measures are presented and analyzed while identifying their main limitations. Finally, several suggestions and recommendations are proposed benefiting from the lessons learned throughout this comprehensive review. 相似文献
16.
17.
随着物联网概念的提出,各国政府专家、企业和技术人员都开始着手研究和建设物联网的工作。物联网安全和隐私问题必然会影响其建设与发展。为了解除物联网发展过程中的障碍,同时为物联网的安全与隐私保护提供相关措施,分析了物联网体系架构所面临的安全威胁,并从感知层、传输层和应用层分别对安全威胁进行详细的研究和总结,最后针对物联网面临的各类安全威胁给出了对应的安全措施。 相似文献