首页 | 本学科首页   官方微博 | 高级检索  
     检索      

物联网信息安全策略研究
引用本文:笪林梅.物联网信息安全策略研究[J].商丘职业技术学院学报,2014(2):28-30.
作者姓名:笪林梅
作者单位:江苏财经职业技术学院,江苏淮安223003
基金项目:2013年江苏省社科研究文化精品重点课题“物联网环境下的信息共享与信息安全研究”(项目编号;13SWB-005)
摘    要:为了保障物联网信息安全,文章通过技术手段和管理方法,提出了一些物联网信息安全策略。基于射频识别技术和无线传输安全隐患,采用身份认证、访问控制、入侵检测和自我修复等节点安全技术,限制数据包发送速度及传输次数和引入可信匿名认证机制等传输安全技术,加强密钥管理,促进技术研发。基于物联网缺乏安全管理平台和法律保障体系等安全问题,提出加强物联网管理,实施立法保护。

关 键 词:物联网  安全  节点  传输  密钥  技术  立法

The Research of IOT Information Security Strategy
DA Linmei.The Research of IOT Information Security Strategy[J].Journal of Shangqiu Vocational and Technical College,2014(2):28-30.
Authors:DA Linmei
Institution:DA Linmei ( J iangsu Polytechnic of Finance& Economics, Huai ' an , 223003, China)
Abstract:To ensure the safety of IOT (Internet of things) ,article puts forward some safety strategy about IOT information in aspects of the technology and management .On base of the using of RFID (Radio Frequency Identification) and the detect of wireless transmission ,we can strengthen the management secret key and promote technological development through the following ways :identity authentication、access control、node security technology including intrusion detection and self repairing 、transmission technology such as restricting the packet transmission rate and transmission number and drawing into trusted anonymous identity authentication .Recognizing lack of the safety management platform and legal safeguard ,author presents that we should strengthen the IOT management and implement legislative protection .
Keywords:The Internet of things  security  node  transmission  secret key  technology  legislation
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号