首页 | 本学科首页   官方微博 | 高级检索  
     

基于可信计算构筑物联网安全边界
引用本文:何申,赵海燕,黄静,杨林.基于可信计算构筑物联网安全边界[J].电信工程技术与标准化,2019(12).
作者姓名:何申  赵海燕  黄静  杨林
作者单位:中国移动研究院,中国移动研究院,中国移动研究院,中国移动研究院
摘    要:近年来,中国物联网政策支持力度不断加大,技术创新成果接连涌现,各领域应用持续深化,产业规模保持快速增长。本论文以物联网接入边界为切入点,探讨了物联网安全接入问题的解决方案。设计了基于可信计算3.0的物联网可信网关,以及安全管理中心,构建了可信的物联网安全边界接入系统。为各种异构物联网终端设备提供了安全屏障,隔绝了针对于物联网设备的网络安全威胁。

关 键 词:物联网  可信计算  安全边界  等级保护
收稿时间:2019/11/23 0:00:00
修稿时间:2019/11/23 0:00:00

Establishing Secure Boundary of IoT based on Trusted Computing
he shen,zhao haiyan,huangjing and yanglin.Establishing Secure Boundary of IoT based on Trusted Computing[J].Telecom Engineering Technics and Standardization,2019(12).
Authors:he shen  zhao haiyan  huangjing and yanglin
Affiliation:China Mobile Research Institute,China Mobile Research Institute,China Mobile Research Institute,China Mobile Research Institute
Abstract:Recent years, China"s IoT policy support has been increasing continuously, technological innovation achievements emerged one after another, applications in various fields expanded deeply, and the industrial scale maintained rapid growth. This paper takes the IoT boundary as the entry point and discusses the solution of the security problem of the IoT. A trusted IoT boundary access system was built by IoT gateway device in which Trusted Computing 3.0 and a security management center were included. It provides a security barrier for various heterogeneous IoT devices by isolating network threats.
Keywords:Internet of Things (IoT)  Trusted Computing  Secure Boundary  Classified Cybersecurity Evaluation
点击此处可从《电信工程技术与标准化》浏览原始摘要信息
点击此处可从《电信工程技术与标准化》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号