ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2017, Vol. 54 ›› Issue (10): 2130-2143.doi: 10.7544/issn1000-1239.2017.20170470

所属专题: 2017应用驱动的网络空间安全研究进展

• 综述 • 上一篇    下一篇



  1. (国家计算机网络入侵防范中心(中国科学院大学) 北京 101408) (
  • 出版日期: 2017-10-01
  • 基金资助: 

Survey of Internet of Things Security

Zhang Yuqing, Zhou Wei, Peng Anni   

  1. (National Computer Network Intrusion Protection Center (University of Chinese Academy of Sciences), Beijing 101408)
  • Online: 2017-10-01

摘要: 随着智能家居、数字医疗、车联网等技术的发展,物联网应用越发普及,其安全问题也受到越来越多研究者的关注.目前,物联网安全的相关研究尚在起步阶段,大部分研究成果还不能完善地解决物联网发展中的安全问题.首先对物联网3层逻辑架构进行了介绍,阐述了每个层次的安全问题与研究现状重点;然后分析并讨论了物联网的主要应用场景(智能家居、智能医疗、车联网、智能电网、工业与公共基础设施)中需要特别关注的隐私保护、入侵检测等安全问题;再次,归纳分析了现有研究工作中的不足与安全问题产生的主要原因,指出物联网安全存在的五大技术挑战:数据共享的隐私保护方法、有限资源的设备安全保护方法、更加有效的入侵检测防御系统与设备测试方法、针对自动化操作的访问控制策略、移动设备的跨域认证方法;最后,通过详尽分析这五大技术挑战,指出了物联网安全未来的研究方向.

关键词: 物联网, 安全, 隐私, 智能, 综述, 挑战

Abstract: With the development of smart home, intelligent care and smart car, the application fields of IoT are becoming more and more widespread, and its security and privacy receive more attention by researchers. Currently, the related research on the security of the IoT is still in its initial stage, and most of the research results cannot solve the major security problem in the development of the IoT well. In this paper, we firstly introduce the three-layer logic architecture of the IoT, and outline the security problems and research priorities of each level. Then we discuss the security issues such as privacy preserving and intrusion detection, which need special attention in the IoT main application scenarios (smart home, intelligent healthcare, car networking, smart grid, and other industrial infrastructure). Though synthesizing and analyzing the deficiency of existing research and the causes of security problem, we point out five major technical challenges in IoT security. They are privacy protection in data sharing, the equipment security protection under limited resources, more effective intrusion detection and defense systems and method, access control of equipment automation operations and cross-domain authentication of motive device. We finally detail every technical challenge and point out the IoT security research hotspots in future.

Key words: Internet of things, security, privacy, intelligent, survey, challenge