The Information Security for the Application of IoT Technology

被引:0
|
作者
Jiang, Jia [1 ]
Yang, Donghai [1 ]
机构
[1] Hebei Univ Sci & Technol, Sch Econ & Management, Shijiazhuang 050018, Peoples R China
来源
LISS 2014 | 2015年
关键词
IoT technology; Information security; Personal privacy; Countermeasures and suggestions;
D O I
10.1007/978-3-662-43871-8_243
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the wide use of IoT technology in the production and daily life, the problems of information security and privacy security have been gradually exposed. Based on the IoT technology architecture, we made a deep analysis of the security problems from the sensor layer, network layer and application layer respectively, and we try to find the key technical points and put forward the corresponding countermeasures and suggestions for the security problems in the above three layers, for example, the security problems of the terminal access mechanism and the routing attacks of wireless sensor networks for the sensor layer; the address space shortage and the denial of service due to network congestion for the network layer; personal privacy and unsound security standard for the application layer.
引用
下载
收藏
页码:1687 / 1693
页数:7
相关论文
共 50 条
  • [21] Application of big data technology in enterprise information security management
    Ping Li
    Limin Zhang
    Scientific Reports, 15 (1)
  • [22] Information technology security
    Elliott, AT
    NUCLEAR MEDICINE COMMUNICATIONS, 2003, 24 (12) : 1205 - 1205
  • [23] Application of Taguchi model to valuation of information security technology considering security quality failure
    Jeong, Yujin
    Yoon, Byungun
    TOTAL QUALITY MANAGEMENT & BUSINESS EXCELLENCE, 2020, 31 (9-10) : 1112 - 1134
  • [24] Application of the IoT technology in agriculture
    Titovskaia, N., V
    Titovskaya, T. S.
    Titovskii, S. N.
    III INTERNATIONAL SCIENTIFIC CONFERENCE: AGRITECH-III-2020: AGRIBUSINESS, ENVIRONMENTAL ENGINEERING AND BIOTECHNOLOGIES, PTS 1-8, 2020, 548
  • [25] Embedding Blockchain Technology Into IoT for Security: A Survey
    Xu, Li Da
    Lu, Yang
    Li, Ling
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13): : 10452 - 10473
  • [26] Security Vulnerabilities in Bluetooth Technology as Used in IoT
    Lonzetta, Angela M.
    Cope, Peter
    Campbell, Joseph
    Mohd, Bassam J.
    Hayajneh, Thaier
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2018, 7 (03):
  • [27] The Application and Practice of Computer Network Security Technology in Electronic Information Engineering
    Guilin University of Electronic Science and Technology, Guangxi, Guilin
    541000, China
    ACM Int. Conf. Proc. Ser., 1600, (73-77):
  • [28] Analysis on Computer Application of under the Management of Network Information Security Technology
    Xue, Chu
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 187 - 190
  • [29] The Application of Information Security Encryption Technology in Military Data System Management
    Zheng, Xiaoli
    MAN-MACHINE-ENVIRONMENT SYSTEM ENGINEERING, 2018, 456 : 423 - 428
  • [30] The Application of Network Anomaly Mining Technology in Campus Network Information Security
    Bin, Wang
    Zhao, Zhi-chao
    Jiang, Yong-cheng
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1793 - 1796