首页 | 本学科首页   官方微博 | 高级检索  
     

物联网M2M的安全分析及策略
引用本文:晁世伟,杨元,李静毅. 物联网M2M的安全分析及策略[J]. 计算机科学, 2011, 0(Z1)
作者姓名:晁世伟  杨元  李静毅
作者单位:重庆邮电大学通信学院;重庆市电力公司;重庆邮电大学计算机学院;
基金项目:信息内网应用服务安全监管策略及其关键技术研究基金资助
摘    要:物联网M2M的先进理念引来了新一轮的无线革命,也暴露出物联网的安全隐患。在此以M2M的前端传感器及设备、网络和末端IT系统三个部分为出发点,提出了从十三个方面来分析物联网所面临的安全隐患问题,并大胆提出了相应的解决策略。

关 键 词:物联网  M2M  物联网机器/感知节点  安全  攻击  

Security Analysis and Strategy for M2M of IOT
CHAO Shi-wei YANG Yuan LI Jing-yi. Security Analysis and Strategy for M2M of IOT[J]. Computer Science, 2011, 0(Z1)
Authors:CHAO Shi-wei YANG Yuan LI Jing-yi
Affiliation:CHAO Shi-wei1 YANG Yuan2 LI Jing-yi3(School of Communication Chongqing University of Posts and Telecommunications,Chongqing 400039,China)1(Chongqing Electric Power Company,Chongqing 400014,China)2(School of Computer,Chongqing University of Posts and Telectommunications,China)3
Abstract:The advanced idea of M2M technology attracts one new round of wireless revolutions,and also exposes the potential security hazard of Internet of Things.So,in this case,M2M's structure,consists of front-end sensors and equipment,networks,back-end IT systems,will become a starting point to analyze the possible potential security threats,those are Internet of Things faced,from thirteen parts which is to proposed in this paper,aggressively proposed their corresponding solutions and strategies.
Keywords:Internet of things  M2M  Internet of thing machine/perception nodes  Security  Attack  
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号