首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
物联网也称传感网,是一个利用传感网络和信息技术将各种物体与网络相连,以获取所需物体相关信息并进行业务应用处理的网络。物联网在世界范围内的定义有各种表述,一般认为:物联网是指按照约定的通信协议,通过感知器件或终端设备把物品联入网络,进行信息通信、交换和处理,以实现智能化应用和管理的一种网络。物联网的体系架构物联网体系架构可划分为感知层、传输层、处理层和应用层。感知层主要组成包括二维码标签和识读器、  相似文献   

2.
物联网应用层关键技术研究   总被引:2,自引:0,他引:2  
乔亲旺 《电信科学》2011,(Z1):59-62
物联网网络架构可划分为3层,作为物联网架构两端的感知层和应用层是物联网的显著特征和核心所在,感知层强调利用感知技术与智能装置对物理世界进行感知识别,应用层则侧重于对感知层采集数据的计算、处理和知识挖掘,从而达到对物理世界实时控制、精确管理和科学决策的目的,而目前从学术研究到应用领域都呈现出"重物联轻应用"的现象。本文从应用层角度分析物联网的需求特征,对应用层的关键技术和目前存在的突出问题进行了研究,主要包括云计算技术、软件和算法、标识与解析技术、信息和隐私安全技术,同时还对应用层的标准体系进行了初步研究。  相似文献   

3.
物联网技术及其标准   总被引:1,自引:0,他引:1  
物联网有3个层次,从下到上依次是感知层、传送层和应用层。物联网涉及的关键技术非常多,从传感器技术到通信网络技术,从嵌入式微处理节点到计算机软件系统,包含了自动控制、通信、计算机等不同领域,是跨学科的综合应用。目前介入物联网领域主要的国际标准组织有IEEE、ISO、ETSI、ITU-T、3GPP、3GPP2等,这些标准组织在物联网总体架构、感知技术、通信网络技术、应用技术等方面制订了一系列标准。  相似文献   

4.
物联网是以基础网络为基础,以RFID、GPS、传感器及激光扫描器为感知元件,以信息采集为目标,同时由业务层、网络层、感知层组成的网络形式。物联网的应用能够实现物与人及物与物的互联,因此物联网也被称作信息产业的新高潮。本文笔者结合实践经验,就物联网感知环境安全机制的关键技术进行研究,由此提出物联网安全机制的改进方案,以期实现物联网的安全运行及健康发展。  相似文献   

5.
物联网感知层信息安全分析与建议   总被引:3,自引:2,他引:1  
马纪丰  梁浩 《现代电子技术》2012,35(19):76-78,88
物联网是以感知为目的,实现人与人、人与物、物与人全面互联的网络。其概念一经提出,得到了各国政府、科研机构以及各类企业的大力推广和积极发展。感知层作为物联网信息获取的主要来源,其信息安全问题是物联网发展所面临的首要问题。对物联网感知层的信息获取方式以及存在的安全威胁进行了研究,并对现有的安全防护机制进行了分析和总结。最后,针对感知层目前存在的信息安全问题及其技术的发展趋势,提出了相应的应对建议措施。  相似文献   

6.
《移动通信》2014,(24):35-35
12月25日,"感知中国"物联网M2M技术联合实验室在无锡揭牌成立,该实验室由中兴通讯和中国电信、威睿电通等在无锡市政府的指导下共同建立。新成立的实验室将主要关注基于中国电信的CDMA2000和FDD-LTE网络上的物联网通信领域的标准、技术以及应用的研究和推广工作,结合企业的各自优势,在物联网通讯技术、物联网网络构建、M2M通信模块标准化、物联网应用解决方案等方面展开深度合作。  相似文献   

7.
王栋平 《电子世界》2014,(12):17-18
第三次信息产业浪潮中物联网在其中站着主导的地位,物联网不仅仅是网络,应该说更是业务和应用,所以说物联网发展的核心是应用创新。将物联网运用到煤矿上,以实现智能化识别、定位、跟踪、监控和管理等一些措施,为解决在煤矿自动化中存在的不重视标准建设、多角度的感知手段缺乏、忽视软件集成,重视硬件集成、缺乏各种科学角度的结合、缺乏应用层面的信息融合、没有泛在的感知网络等缺陷,要解决这些缺陷必须要在煤矿自动化中建设煤矿感知物联网,为了提高煤矿企业生产效率,须实现灾害感知、设备感知、人员感知,从而实现主动式安全保障,预知设备维修,确保减灾安全的建设目标。  相似文献   

8.
李成  韩涵 《世界电信》2013,(10):33-38
在感知、网络和应用层可能出现的各类安全隐患将给物联网安全带来严峻挑战,探索技术与政策监管的双重保障已成为业界的必然选择。当前,物联网在中国的发展已经进入关键阶段,各地纷纷建立物联网示范工程,物联网应用也存在诸多严重的安全隐患。分析物联网应用中的安全问题,从技术和政策监管两个方面关注并提出有效的  相似文献   

9.
文章针对近年来LTE技术与物联网技术的融合趋势,在分别简述物联网和云计算分层技术结构及其关键技术的基础上,分析了LTE技术、物联网技术和云计算技术的融合问题,主要从物联网感知层面、网络层面和应用层面进行了分析。  相似文献   

10.
胡琳 《电子测试》2014,(11):71-72
本文主要结合物联网发展的实际情况,基于物联网感知层RFID技术的实现原理,研究和分析感知物联网技术在体育竞技中的应用情况及实践案例等。  相似文献   

11.
分析了国内外物联网安全政策、技术、标准、产业等形势,重点强调了当前我国物联网发展中存在的安全风险,包括大连接环境下的设备风险、物联网网络本身安全风险以及物联网上承载的各类应用安全风险,提出了打造以密码为核心的物联网安全体系,加速新技术在物联网安全的应用,以新基建为契机建立物联网领域安全设备泛在化部署新体系,以多层次立体式理念确保物联网安全,呼吁供给侧需求侧建立安全协同新机制,共同促进物联网产业安全可持续发展。  相似文献   

12.
The wide variety of smart embedded computing devices and their increasing number of applications in our daily life have created new opportunities to acquire knowledge from the physical world anytime and anywhere, which is envisioned as the“Internet of Things” (IoT). Since a huge number of heterogeneous resources are brought into IoT, one of the main challenges is how to efficiently manage the increasing complexity of IoT in a scalable, flexible, and autonomic way. Furthermore, the emerging IoT applications will require collaborations among loosely coupled devices, which may reside in various locations of the Internet. In this paper, we propose a new IoT network management architecture based on cognitive network management technology and Service-Oriented Architecture to provide effective and efficient network management of IoT.  相似文献   

13.
Different devices with different characteristics form a network to communicate among themselves in Internet of Things (IoT). Thus, IoT is of heterogeneous in nature. Also, Internet plays a major role in IoT. So, issues related to security in Internet become issues of IoT also. Hence, the group and hierarchical management scheme for solving security issues in Internet of Things is proposed in this paper. The devices in the network are formed into groups. One of the devices is selected as a leader of each group. The communication of the devices from each group takes place with the help of the leader of the corresponding group using encrypted key to enhance the security in the network. Blom's key predistribution technique is used to establish secure communication among any nodes of group. The hierarchy is maintained such that the security can be increased further, but the delay is increased as it takes time to encrypt at every level of hierarchy. Hence, the numbers of levels of hierarchy need to be optimized such that delay is balanced. Hence, this algorithm is more suitable for delay‐tolerant applications. The performance of the proposed Algorithm is evaluated and is proved to perform better when compared with the legacy systems like Decentralized Batch‐based Group Key Management Protocol for Mobile Internet of Things (DBGK).  相似文献   

14.
Internet of Things (IoT) technologies allow everyday objects including small devices in sensor networks to be capable of connecting to the Internet. Such an innovative technology can lead to positive changes in human life. However, if there is no proper security mechanism, private and sensitive data around humans can be revealed to the public Internet. In this aspect, this paper considers security issues of the IoT. In particular, we focus on various challenges in deploying Datagram Transport Layer Security (DTLS) protocol into a resource constrained environment. DTLS provides secure communication with UDP-based applications the same as TLS does for TCP-based applications. Several standard organizations such as IETF, oneM2M and OMA recommend using the DTLS as a default secure scheme for CoAP which is a new standard specified for resource-constrained environments. To find a practical way to deploy the DTLS in such a constrained IoT environments, we propose an IoT–Cloud collaboration system, where DTLS handshake delegation is the main component. We also implement and evaluate the proposed system in our real IoT testbed, where constrained devices are interconnected with each other in a multi-hop fashion. Evaluation results show that the proposed scheme dramatically reduces DTLS handshake latency, implementation code size and energy consumption.  相似文献   

15.
The widespread use of Internet of Things (IoT) in various wireless sensor networks applications has increased their importance in recent years. IoT is a smart technology that connects anything anywhere at any time. These smart objects, which connect the physical world with the world of computing infrastructure, are expected to permeate all aspects of our daily lives and revolutionize a number of application domains such as healthcare, energy conservation, and transportation. As wireless networking expands, the disadvantage of wireless communication is clearly obvious. People's apprehension over the IoT's dependability has therefore skyrocketed. IoT networks' key requirements are dependability, channel security, fault tolerance, and reliability. Monitoring the IoT networks depends on the availability and correct functioning of all the network nodes. Recent research has proposed promising solutions to address these challenges. This article systematically examines recent articles that use meta-heuristic and nature-inspired algorithms to establish reliable IoT networks. Eighteen articles were analyzed in four groups. Results showed that reliable enhancement mechanisms in IoT networks increase fault node detection, network efficiency, and lifetime and attain energy optimization results in the IoT concept. Additionally, it was discovered in the literature that the current studies focus on how to effectively use edge network capabilities for IoT application executions and support, along with the related needs.  相似文献   

16.
The Internet of Things (IoT) is a network of interconnected smart objects having capabilities that collectively form an ecosystem and enable the delivery of smart services to users. The IoT is providing several benefits into people's lives through the environment. The various applications that are run in the IoT environment offer facilities and services. The most crucial services provided by IoT applications are quick decision for efficient management. Recently, machine learning (ML) techniques have been successfully used to maximize the potential of IoT systems. This paper presents a systematic review of the literature on the integration of ML methods in the IoT. The challenges of IoT systems are split into two categories: fundamental operation and performance. We also look at how ML is assisting in the resolution of fundamental system operation challenges such as security, big data, clustering, routing, and data aggregation.  相似文献   

17.
Internet of Things (IoT) is playing a more and more important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and RFID. With the great potential of IoT, there come all kinds of challenges. This paper focuses on the security problems among all other challenges. As IoT is built on the basis of the Internet, security problems of the Internet will also show up in IoT. And as IoT contains three layers: perception layer, transportation layer and application layer, this paper will analyze the security problems of each layer separately and try to find new problems and solutions. This paper also analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues of IoT as a whole and tries to find solutions to them. In the end, this paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT.  相似文献   

18.
The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and their surroundings. This will give immediate access to information about the physical world and the objects in it—leading to innovative services and increase in efficiency and productivity. This paper studies the state-of-the-art of IoT and presents the key technological drivers, potential applications, challenges and future research areas in the domain of IoT. IoT definitions from different perspective in academic and industry communities are also discussed and compared. Finally some major issues of future research in IoT are identified and discussed briefly.  相似文献   

19.

The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. However, security often serves as a critical reason for the widespread adoption of any innovation. While the IoT has increased business productivity and enriched diverse areas of life over the years, the world is yet to see a methodical revolution of its humongous application and transformation given its ubiquity and highly interconnected global network structure. The main culprit for such lapses is principally attributed to security and privacy issues which have been widely discussed in research articles and reviews but remain largely unaddressed in the literature. Hence, this paper provides a state-of-the-art review of IoT security and its challenges. It overviews technical and legal solutions that are useful to private, organizational, and governmental enterprises. The study encompasses the review and security analysis of IoT’s evolution and revolution, IoT security assessments, requirements, current research challenges in security and much more. Consequently, it offers potential solutions to address the security challenges discussed and further present open research issues, research gaps, opportunities, future development, and recommendations. This overview is intended to serve as a knowledgebase that will proffer novel foresight to guide users and administrators in positioning themselves and their organizations in a manner that is consistent with their overall objectives, mission, and vision for remarkable outcomes. Likewise, interested scholars and researchers can explore topics and directions from the study in providing better solutions to the numerous problems in IoT security.

  相似文献   

20.
杨平  范苏洪  朱艳 《通信技术》2020,(3):738-743
物联网普遍存在遭受网络攻击类型多样化、没有安全保护标准、数据极易被截获或破解等安全风险,核心问题在于缺乏设备、服务提供者、应用、数据、交易等物的安全认证机制。因此,有必要建立一种提供认证鉴权和数据保护的方案体系,建立物与物、物与人之间的信任。密码技术是解决核心安全问题的基础理论和技术,而传统的证书体系并不适应于物联网环境,基于商密SM9的算法才是目前物联网安全认证的最佳选择。物联网安全平台依赖商密SM9算法的优势,有效克服了传统算法中密钥分发安全性弱等问题,深入物联网行业终端与应用层面,建立了面向物联网业务的端到端安全。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号