期刊文献+

物联网的安全威胁与应对策略 被引量:1

The Security Risk and Coping Strategy on Internet of Things
在线阅读 下载PDF
导出
摘要 物联网被称为第三次信息革命,随着物联网技术的发展和应用的不断扩展,物联网的安全隐患受到人们的日益关注,安全问题已经成为制约其发展的重要因素。从剖析物联网的三层体系结构出发,分析了物联网受到的种种安全威胁,最后给出相应的安全策略。 Intemet of Things is known as the third information revolution. With the continuous expansion of development and applica- tion in the Internet of Things technology, more and more attention has been paid to the security risks of the Intemet of Things. Security has become an important factor restricting its development. This paper starts from the Three-tier architecture, analyzes several kinds of security threats of the Intemet of Things, and finally gives the corresoonding security strategy.
作者 周航 秦东霞
出处 《智能计算机与应用》 2012年第3期37-39,共3页 Intelligent Computer and Applications
基金 河南省科技厅基础与前沿技术研究计划项目(112300410307)
关键词 物联网:安全威胁 射频识别 Intemet ofThings Security Risks RadioFrequencylDentification
  • 相关文献

参考文献8

二级参考文献75

  • 1季浏,潘绍伟,谭华,耿培新,滕子敬,许世岩,胡增荦.中小学体育与健康课程标准的主要特征是什么[J].中国学校体育,2002,21(3):8-9. 被引量:67
  • 2克罗蒂·雪瑞尔[美].适应体育[M].台北:关商麦格罗.希尔国际股份有限公司.2001.
  • 3PERRIG A,SZEWCZYK R,WEN V et al.SPINS:security protocols for sensor networks[J].Wireless Networks Journal,2002,8(5):521-534.
  • 4KARLOF C,SASTRY N,WAGNER D.TinySec:a link layer security architecture for wireless sensor networks.in ACM sen-sys[C].2004.
  • 5LIU D,NING P,DU W.Detecting malicious beacon nodes for secure location discovery in wireless sensor networks[C].In the 25th International Conference on Distributed Computing Systems,2005.
  • 6MALAN D J,WELSH M,SMITH M.A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C].In IEEE SECON,2004:71-80.
  • 7PRZYDATEK B,SONG D,PERRIG A.SIA:secure information aggregation in sensor networks[C].In Proceedings of ACM Sen-Sys,2003:255-265.
  • 8ZHU S.An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks[C].IEEE Symposium on Security and Privacy,2004.
  • 9DENG J.A performance evaluation of intrusion-tolerant routing in wireless sensor networks[C].California:In 2nd International Workshop on Information Processing in Sensor Networks (IPSN 03),2003.
  • 10DENG J,HAN R,MISHRA S.Countermeasures against traffic analysis attacks in wireless sensor networks[R].Technical report,CU-CS-987-04,2004.

共引文献112

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部