The Research of Security Technology in the Internet of Things

被引:0
|
作者
Sun, Xiangyu [1 ]
Wang, Changguang [1 ]
机构
[1] Hebei Normal Univ, Coll Phys Sci & Informat Engn, Shijiazhuang 050016, Peoples R China
来源
ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 2 | 2011年 / 105卷
关键词
Internet of things; security technology; hierarchy structure; defensive measures;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A security hierarchy structure of Internet of Things (IOT) was proposed, which is consisted of a sensation layer, a network layer and an application layer. From the three different layers, the security issues faced with the IOT and then the security requirements of it were analyzed. Through combining the security technologies of Internet, sensor networks and other mature security technologies, we can develop some appropriate defensive measures to ensure the security of the IOT, including the security of sensor nodes, privacy protection, intrusion detection, authentication and access control, thus achieving its safe, reliable and efficient operation.
引用
收藏
页码:113 / 119
页数:7
相关论文
共 50 条
  • [31] Internet of things technology, research, and challenges: a survey
    Vishwakarma A.K.
    Chaurasia S.
    Kumar K.
    Singh Y.N.
    Chaurasia R.
    Multimedia Tools and Applications, 2025, 84 (11) : 8455 - 8490
  • [32] The Research on The Technology of Internet of Things And Embedded System
    Yang, Dongxiang
    Ren, Haijun
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 395 - 398
  • [33] Internet of Things Research and Application of Information Technology
    Xia, Xianyu
    2020 5TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2020), 2020, : 1818 - 1821
  • [34] Research on Key Technology and Applications for Internet of Things
    Chen, Xian-Yi
    Jin, Zhi-Gang
    2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 561 - 566
  • [35] A Research on Positioning Technology Based on Internet of Things
    Zou, Dongyao
    Sun, Hui
    Chen, Yan
    Li, Nana
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 926 - 929
  • [36] Research on the trusted protection technology of internet of things
    Ning, Zhenhu
    Yang, Yongli
    Zhang, Yahao
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 14339 - 14348
  • [37] Current research on Internet of Things (IoT) security: A survey
    Noor, Mardiana Binti Mohamad
    Hassan, Wan Haslina
    COMPUTER NETWORKS, 2019, 148 : 283 - 294
  • [38] The Perceptual Environment Security Mechanism Research for Internet of Things
    Ma Shideng
    Huang Hai
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1974 - 1977
  • [39] Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things
    Yang, Aimin
    Li, Yifan
    Kong, Fanbei
    Wang, Guoqing
    Chen, Enhong
    IEEE ACCESS, 2018, 6 : 50187 - 50196
  • [40] Security in the internet of things
    Aigner M.
    Cryptology and Information Security Series, 2010, 4 : 109 - 124