首页 | 本学科首页   官方微博 | 高级检索  
     

物联网安全研究
引用本文:刘平,刘晓东.物联网安全研究[J].信息安全与通信保密,2012(2):69-72.
作者姓名:刘平  刘晓东
作者单位:1. 无锡江南信息安全工程技术中心,江苏无锡,214072
2. 山东大学网络信息安全研究所,山东济南,250100
摘    要:物联网是计算机、互联网与移动通信网等相关技术的演进和延伸,其安全问题愈来愈受到关注。该文对物联网安全进行深入研究,对其体系结构进行分析,并将其应用模型抽象为“物、网、应用”;将其安全需求概括为“谁家的物归谁管,谁家的物归谁用”。该文将“物”抽象为四类,即感知类物、被感知类物、被控制类物及感知和被控制类物,并针对每一类“物”的应用提出了具体的解决方案,同时也提出了“网”与“应用”的安全解决方案。

关 键 词:物联网  抽象模型  密钥分散  签名认证

Study on IoT Security
LIU Ping,LIU Xiao-dong.Study on IoT Security[J].China Information Security,2012(2):69-72.
Authors:LIU Ping  LIU Xiao-dong
Affiliation:(lWuxi Jiangnan Information Security Engineering Center, Wuxi Jiangsu 214072, China; 2Institute of Network Security, Shandong University, Jinan Shandong 250100, China)
Abstract:IoT(internet of things) is the evolution and extension of related technologies such as computer, Internet and mobile communication network, and its security issue attracts more and more attention. An in-depth study of IoT security is done, and its architecture analyzed. Meanwhile, its application model is abstracted to things, network and applications, and its security requirements summarized as things only controlled and usecl by its owner. The things are abstracted to four categories in this paper, including perceiving things, perceived things, controlled things, perceiving and controlled things, and concrete solutions for each category are proposed. At the same time, security solutions for network and application are also proposed.
Keywords:IoT(Internet of things)  abstracted model  key dispersion  signature verification
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号