首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
谢萍  刘孝颂 《电信科学》2020,36(12):139-146
与传统互联网相比,由于基于SDN的物联网覆盖面更广、连接的设备更多、传输的数据更复杂等原因,还存在很多安全方面的技术挑战。提出了在SDN物联网中加入一个基于区块链的安全层作为安全网关,对进入物联网的数据进行一次性的精确验证,各安全网关作为平等的区块链节点加入区块链系统,结合区块链系统的可追踪和不可篡改性,提高了SDN物联网部署的安全性能和效率。  相似文献   

2.
互联网与网络安全   总被引:2,自引:0,他引:2  
随着互联网的快速发展和网络用户的不断攀升,网络安全问题也日益凸显,从网络信息安全的脆弱性、网络安全的主要技术、常见网络攻击方法及对策、网络安全建设等方面剖析了当前网络信息安全存在的主要问题,并对常见的网络攻击从技术层面提出解决方案,希望通过网络安全建设逐步消除网络信息安全的隐患。  相似文献   

3.
随着Internet的发展与普及,网络安全问题日益突出,已经严重地干扰了网络的自由和安全。就此对目前网络中存在的安全问题进行了探讨与论证,并对目前网络中比较流行的网络攻击手段进行了总结归类和研究与分析,进而提出防御策略。  相似文献   

4.
于继江 《通信技术》2009,42(8):65-67
根据生物免疫系统中抗体浓度的变化与生物体生病严重程度的对应关系,提出一种基于人工免疫的网络攻击强度评估方法。实验表明,该方法可以定量、实时对网络攻击强度进行评估,具有较高的价值。  相似文献   

5.
区块链技术原本基于由电脑组成的P2P网络中,如何将其应用于物联网中是一个值得考虑的问题。本文对物联网引入区块链技术遇到的主要挑战进行分析,并提出相应的应对思路。  相似文献   

6.
    
Internet of Things (IoT) devices are increasingly being found in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things, Internet-of-Battlefield-Things, etc. In this paper, we survey articles presenting IoT security solutions published in English since January 2016. We make a number of observations, including the lack of publicly available IoT datasets that can be used by the research and practitioner communities. Given the potentially sensitive nature of IoT datasets, there is a need to develop a standard for sharing IoT datasets among the research and practitioner communities and other relevant stakeholders. Thus, we posit the potential for blockchain technology in facilitating secure sharing of IoT datasets (e.g., using blockchain to ensure the integrity of shared datasets) and securing IoT systems, before presenting two conceptual blockchain-based approaches. We then conclude this paper with nine potential research questions.  相似文献   

7.
首先阐述了目前计算机网络中存在的安全问题,接着分析了各种常见的网络攻击及其防护措施。  相似文献   

8.
    
Healthcare is a vitally important field in the industry and evolving day by day in the aspect of technology, services, computing, and management. Its potential significance can be increased by incorporating Internet of Things (IoT) technology to make it smart in the aspect of automating activities, which is then further reformed in the healthcare domain with the help of blockchain technology. Blockchain technology provides many features to IoT-based healthcare domain applications such as restructuring by securing traditional practices, data management, data sharing, patient remote monitoring, and drug analysis. In this study, a systematic literature review has been carried out in which a total of 52 studies were selected to conduct systematic literature review from databases PubMed, IEEE Access, and Scopus; the study includes IoT technology and blockchain integration in healthcare domain-related application areas. This study also includes taxonomy that mentions the aspects and areas in healthcare domain incorporating the traditional system with the integration of IoT and blockchain to provide transparency, security, privacy, and immutability. This study also includes the incorporation of related sensors, platforms of blockchain, the objective focus of selected studies, and future directions by incorporating IoT and blockchain in healthcare domain. This study will help researchers who want to work with IoT and blockchain technology integration in healthcare domain.  相似文献   

9.
现代社会,互联网成为了人民生活的基础设施,网络安全就显得尤为重要。DDOS攻击给网络服务的正常运行会带来不可估量的损失,而现有的DDOS攻击防御方法以保护服务器为初衷,使得过度保护而影响了用户使用权益。文章设计并提出在以用户访问权益为优先考虑的情况下,通过网络数据包捕获、分析与功能限制模组、验证码、黑名单四大模块实现,缓解DDos攻击对服务器造成的过大伤害并使服务器维持运行持续提高服务的方法,通过实验可以有效保障服务器运行的同时抵抗DDOS攻击带来的风险。  相似文献   

10.
Existing symmetric cryptography‐based solutions against pollution attacks for network coding systems suffer various drawbacks, such as highly complicated key distribution and vulnerable security against collusion. This letter presents a novel homomorphic subspace message authentication code (MAC) scheme that can thwart pollution attacks in an efficient way. The basic idea is to exploit the combination of the symmetric cryptography and linear subspace properties of network coding. The proposed scheme can tolerate the compromise of up to r?1 intermediate nodes when r source keys are used. Compared to previous MAC solutions, less secret keys are needed for the source and only one secret key is distributed to each intermediate node.  相似文献   

11.
何峣  黄海 《电信科学》2017,33(2):36-41
研究了智能终端安卓系统,提出了基于证书链验证机制的智能终端安卓系统安全加固方案,并对安卓原生系统所表现出来的安全问题进行深入的分析与研究,比较了采用安全加固的系统较之安卓原生系统在安全性上表现出的优势.通过结合证书链机制,以完整性验证为核心的安全架构,能够达到最大限度保护智能终端安全的目标.  相似文献   

12.
殷翔 《信息通信》2014,(9):116-117
通过对企业网络中常见攻击事件、病毒的分析,有助于我们提高网络安全意识,提高网络安全防御的能力,防患于未然,更好地保障企业网络健康平稳运行。  相似文献   

13.
    
The evolutionary advancements in the field of technology have led to the instigation of cloud computing. The Internet of Things paradigm stimulated the extensive use of sensors distributed across the network edges. The cloud datacenters are assigned the responsibility for processing the collected sensor data. Recently, fog computing was conceptuated as a solution for the overwhelmed narrow bandwidth. The fog acts as a complementary layer that interplays with the cloud and edge computing layers, for processing the data streams. The fog paradigm, as any distributed paradigm, has its set of inherent challenges. The fog environment necessitates the development of management platforms that effectuates the orchestration of fog entities. Owing to the plenitude of research efforts directed toward these issues in a relatively young field, there is a need to organize the different research works. In this study, we provide a compendious review of the research approaches in the domain, with special emphasis on the approaches for orchestration and propose a multilevel taxonomy to classify the existing research. The study also highlights the application realms of fog computing and delineates the open research challenges in the domain.  相似文献   

14.
    
The integration of the Internet of Things (IoT) with blockchain technology has enabled a significant digital transformation in the areas of E-health, supply chain, financial services, smart grid, and automated contracts. Many E-health organizations take advantage of the game-changing power of blockchain and IoT to improve patient outcomes and optimize internal operational activities. In particular, it proposes a decentralized and evolutive way to model and acknowledge trust and data validity in a peer-to-peer network. Blockchain promises transparent and secure systems to provide new business solutions, especially when combined with smart contracts. In this paper, we provide a comprehensive survey of the literature involving blockchain technology applied to E-health. First, we present a brief background on blockchain and its fundamentals. Second, we review the opportunities and challenges of blockchain in the context of E-health. We then discuss popular consensus algorithms and smart contracts in blockchain in conjunction with E-health. Finally, blockchain platforms are evaluated for their suitability in the realm of IoT-based E-health, including electronic health records, electronic management records, and personal health records, from the perspective of remote patient monitoring.  相似文献   

15.
多接入边缘计算(multi-access edge computing,MEC)能为城市轨道交通中的计算密集型业务和时延敏感型业务提供高质量的服务能力,然而轨道交通边缘计算网络中的大量边缘设施暴露在开放式环境中,其隐私保护和传输安全面临着很大的挑战。区块链(blockchain)具有分布式账本、共识机制、智能合约、去中心化应用等功能特性,因此,区块链技术可以为分布式轨道交通边缘计算网络构建系统性的安全防护机制,从而保障网络安全和数据安全,实现高质量的城市轨道交通服务。首先,介绍了区块链的基本概念;其次,设计了轨道交通边缘计算网络架构,提出了融合区块链的轨道交通边缘计算网络安全防护机制和应用实例;最后,对该安全防护机制面临的问题和挑战进行了分析和展望。  相似文献   

16.
    
Through consulting lots of domestic and international literatures about sensor-cloud security,a series of security problems are found,such as reputation problem of service provider,the coupling problem of physical nodes,the leak of authority management,et al,which seriously hinders the further development of sensor-cloud.The secure problems occurring in sensor-cloud were analyzed,the current secure technologies were contrasted ,similarities and differences of various types solutions were discussed and summarized.After that,several future challenges of sensor-cloud security were concluded.Finally,a fog-based structure was proposed to solve the security problems,which would bring new ideas to the sensor-cloud security research.  相似文献   

17.
当今物联网时代已经到来,窄带物联网技术(NB-IoT)以其低功耗、广覆盖等技术优势,成为当下炙手可热的物联网通信技术,受到众多电信运营商的青睐。研究首先分析了窄带物联网的技术特点,并以运营商的视角,从无线网、核心网、物联网平台三个维度阐述窄带物联网技术的部署方案。然后列举了窄带物联网的几个典型应用场景。最后对物联网的发展前景进行了展望。  相似文献   

18.
研究了移动AdHoc网络(MANET)按需路由协议的安全问题,分析了现有的安全改进方案的优缺点.以一种基于椭圆曲线密码体制的高效数字签名算法为基础,提出一种适合按需路由协议的安全性改进方法,对其执行效率和安全性进行了分析,并在QualNet仿真平台下对应用该方法改进的AODV协议进行验证.仿真过程实现了真实的安全算法,针对blackholes和rushing两种常见攻击分别构建了攻击模型,结果表明改进后协议以很小的延时和协议开销代价得到了较高的安全性.  相似文献   

19.
陈志涛  金波  杨小东 《电子测试》2020,(4):79-80,65
为了提高网络数据传输的安全性,本文对区块链技术进行研究,阐述了其基础框架,并基于区块链技术提出了数据安全传输方案,主要包括感知数据、数据加密、数据传输三部分,期望提高数据传输的安全性,以降低数据被非法截取的发生率。  相似文献   

20.
    
Fog‐to‐cloud (F2C) computing is an emerging computational platform. By combing the cloud, fog, and IoT, it provides an excellent framework for managing and coordinating the resources in any smart computing domain. Efficient management of these kinds of diverse resources is one of the critical tasks in the F2C system. Also, it must be considered that different types of services are offered by any smart system. So, before managing these resources and enabling the various types of services, it is essential to have some comprehensive informational catalogue of resources and services. Hence, after identifying the resource and service‐task taxonomy, our main aim in this paper is finding out a solution for properly organizing this information over the F2C system. For that purpose, we are proposing a modified F2C framework where all the information is distributively stored near to the edge of the network. Finally, by presenting some experimental results, we evaluate and validate the performance of our proposing framework.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号