期刊文献+

物联网安全关键技术研究 被引量:9

Research on key technology of security problem of Internet of things
在线阅读 下载PDF
导出
摘要 通过分析物联网的组网特点及安全需求,对物联网面临的安全威胁进行分类总结,并提出物联网安全问题解决方案;最后探讨在安全方案实现过程中尚未解决的问题,并指出今后研究的重要方向。 In this paper, lyzed, and summarized to security problems of plementation process of networking features and security re the security threats of Internet of T Internet of Things. Finally it probe security solutions and showed the f quirements of Internet of Things are anahings. Secondly it presented the solutions d into the unresolved problems in the imurther research directions.
作者 唐尧华 黄欢
出处 《河北省科学院学报》 CAS 2011年第4期49-52,共4页 Journal of The Hebei Academy of Sciences
关键词 物联网 网络安全 传感器 安全机制 Internet of Things Network security Sensor Security scheme
  • 相关文献

参考文献6

二级参考文献85

  • 1沈旭昌.保持隐私的关联规则挖掘[J].计算机工程与设计,2005,26(3):750-751. 被引量:2
  • 2张军,熊枫.网络隐私保护技术综述[J].计算机应用研究,2005,22(7):9-11. 被引量:22
  • 31,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 42,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 53,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 64,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 75,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 86,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 97,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 10UIT. ITU Internet Reports 2005:The Internet of Things [R].2005.

共引文献575

同被引文献47

  • 1徐燕.基于RFID物联网的应用研究[J].微型电脑应用,2011(5):46-48. 被引量:14
  • 2孙梦梦,刘元安,刘凯明.物联网中的安全问题分析及其安全机制研究[J].保密科学技术,2011(11):61-66. 被引量:19
  • 3朱晓荣,孙君,齐丽娜,等.物联网[M].北京:人民邮电出版社.2010.
  • 4ROMAN Rodrigo, ALCARAZ Cristina. Key management systems for sensor networks in the context of the Internet of Things [J]. Computers and Electrical Engineering, 2011(37): 147-159.
  • 5AKYILDIZ I, SU W. Wireless sensor networks: a survey [J]. Comput Networks, 2002, 38(4): 393-422.
  • 6CHRISTIN D, REINHARDT A, MOGRE P, et al. Wireless sensor networks and the Internet of Things: selected challenges [C]// Proceedings of the 8th GI/ITG KuVS Fachgesprach Drahtlose Sensornetze. Hamburg: FGSN, 2009:11-20.
  • 7ALCARAZ C, LOPEZ J. A security analysis for wireless sensor mesh networks in highly critical systems [J]. IEEE Trans. on Systems, Man and Cybernetics, Part C: Applications and Reviews, 2010, 40(4): 419-428.
  • 8马舂光,尚治国,王慧强.无线传感器网络密钥管理问题研究综述[C].计算机科学(第一届中国无线传感器网络会议论文集),2007.34(专刊):158-161.
  • 9Medaglia C M,Serbanati A.An overview of privacy and security issues in the internet of things. The Internet of Things . 2010
  • 10International Telecommunication Union.Internet Reports2005:The Internet of Things[]..2005

引证文献9

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部