• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

物联网安全综述

张玉清, 周威, 彭安妮

张玉清, 周威, 彭安妮. 物联网安全综述[J]. 计算机研究与发展, 2017, 54(10): 2130-2143. DOI: 10.7544/issn1000-1239.2017.20170470
引用本文: 张玉清, 周威, 彭安妮. 物联网安全综述[J]. 计算机研究与发展, 2017, 54(10): 2130-2143. DOI: 10.7544/issn1000-1239.2017.20170470
Zhang Yuqing, Zhou Wei, Peng Anni. Survey of Internet of Things Security[J]. Journal of Computer Research and Development, 2017, 54(10): 2130-2143. DOI: 10.7544/issn1000-1239.2017.20170470
Citation: Zhang Yuqing, Zhou Wei, Peng Anni. Survey of Internet of Things Security[J]. Journal of Computer Research and Development, 2017, 54(10): 2130-2143. DOI: 10.7544/issn1000-1239.2017.20170470
张玉清, 周威, 彭安妮. 物联网安全综述[J]. 计算机研究与发展, 2017, 54(10): 2130-2143. CSTR: 32373.14.issn1000-1239.2017.20170470
引用本文: 张玉清, 周威, 彭安妮. 物联网安全综述[J]. 计算机研究与发展, 2017, 54(10): 2130-2143. CSTR: 32373.14.issn1000-1239.2017.20170470
Zhang Yuqing, Zhou Wei, Peng Anni. Survey of Internet of Things Security[J]. Journal of Computer Research and Development, 2017, 54(10): 2130-2143. CSTR: 32373.14.issn1000-1239.2017.20170470
Citation: Zhang Yuqing, Zhou Wei, Peng Anni. Survey of Internet of Things Security[J]. Journal of Computer Research and Development, 2017, 54(10): 2130-2143. CSTR: 32373.14.issn1000-1239.2017.20170470

物联网安全综述

基金项目: 国家自然科学基金项目(61572460,61272481);国家重点研发计划项目(2016YFB0800703);信息安全国家重点实验室的开放课题(2017-ZD-01);国家发改委信息安全专项项目[(2012)1424];国家111项目(B16037)
详细信息
  • 中图分类号: TP393

Survey of Internet of Things Security

  • 摘要: 随着智能家居、数字医疗、车联网等技术的发展,物联网应用越发普及,其安全问题也受到越来越多研究者的关注.目前,物联网安全的相关研究尚在起步阶段,大部分研究成果还不能完善地解决物联网发展中的安全问题.首先对物联网3层逻辑架构进行了介绍,阐述了每个层次的安全问题与研究现状重点;然后分析并讨论了物联网的主要应用场景(智能家居、智能医疗、车联网、智能电网、工业与公共基础设施)中需要特别关注的隐私保护、入侵检测等安全问题;再次,归纳分析了现有研究工作中的不足与安全问题产生的主要原因,指出物联网安全存在的五大技术挑战:数据共享的隐私保护方法、有限资源的设备安全保护方法、更加有效的入侵检测防御系统与设备测试方法、针对自动化操作的访问控制策略、移动设备的跨域认证方法;最后,通过详尽分析这五大技术挑战,指出了物联网安全未来的研究方向.
    Abstract: With the development of smart home, intelligent care and smart car, the application fields of IoT are becoming more and more widespread, and its security and privacy receive more attention by researchers. Currently, the related research on the security of the IoT is still in its initial stage, and most of the research results cannot solve the major security problem in the development of the IoT well. In this paper, we firstly introduce the three-layer logic architecture of the IoT, and outline the security problems and research priorities of each level. Then we discuss the security issues such as privacy preserving and intrusion detection, which need special attention in the IoT main application scenarios (smart home, intelligent healthcare, car networking, smart grid, and other industrial infrastructure). Though synthesizing and analyzing the deficiency of existing research and the causes of security problem, we point out five major technical challenges in IoT security. They are privacy protection in data sharing, the equipment security protection under limited resources, more effective intrusion detection and defense systems and method, access control of equipment automation operations and cross-domain authentication of motive device. We finally detail every technical challenge and point out the IoT security research hotspots in future.
  • 期刊类型引用(3)

    1. 白婷,刘轩宁,吴斌,张梓滨,徐志远,林康熠. 基于多粒度特征交叉剪枝的点击率预测模型. 计算机研究与发展. 2024(05): 1290-1298 . 本站查看
    2. 李莎莎,崔铁军. 系统故障演化过程中故障事件发生概率的修正方法研究. 安全与环境学报. 2024(06): 2068-2074 . 百度学术
    3. 苗忠琦,童向荣. 一种偏差和方差双降的双鲁棒去偏学习模型. 小型微型计算机系统. 2024(11): 2663-2672 . 百度学术

    其他类型引用(1)

计量
  • 文章访问数: 
  • HTML全文浏览量:  0
  • PDF下载量: 
  • 被引次数: 4
出版历程
  • 发布日期:  2017-09-30

目录

    /

    返回文章
    返回