The Information Security for the Application of IoT Technology

被引:0
|
作者
Jiang, Jia [1 ]
Yang, Donghai [1 ]
机构
[1] Hebei Univ Sci & Technol, Sch Econ & Management, Shijiazhuang 050018, Peoples R China
来源
LISS 2014 | 2015年
关键词
IoT technology; Information security; Personal privacy; Countermeasures and suggestions;
D O I
10.1007/978-3-662-43871-8_243
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the wide use of IoT technology in the production and daily life, the problems of information security and privacy security have been gradually exposed. Based on the IoT technology architecture, we made a deep analysis of the security problems from the sensor layer, network layer and application layer respectively, and we try to find the key technical points and put forward the corresponding countermeasures and suggestions for the security problems in the above three layers, for example, the security problems of the terminal access mechanism and the routing attacks of wireless sensor networks for the sensor layer; the address space shortage and the denial of service due to network congestion for the network layer; personal privacy and unsound security standard for the application layer.
引用
下载
收藏
页码:1687 / 1693
页数:7
相关论文
共 50 条
  • [31] Research on Application of Information Security Protection Technology in Power Internet of Things
    Li, Dong
    Chang, Yingxian
    Yu, Hao
    Dong, Qingquan
    Chen, Yuhang
    ADVANCED INTELLIGENT TECHNOLOGIES FOR INDUSTRY, 2022, 285 : 491 - 498
  • [32] The application of XML security technology in real estate management information system
    Pan, Feng
    Song, Yang
    Sixth Wuhan International Conference on E-Business, Vols 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 1563 - 1570
  • [33] Application of artificial intelligence technology in electronic information security protection system
    You G.
    International Journal of Business Intelligence and Data Mining, 2024, 25 (01) : 128 - 145
  • [34] Introduction to EM Information Security for IoT devices
    Hayashi, Yuichi
    Verbauwhede, Ingrid
    Radasky, William A.
    2018 JOINT IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY AND 2018 IEEE ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC/APEMC), 2018, : 735 - 738
  • [35] Application of Dynamic Security Technology Architecture for Advanced Directional Attacks in Power System Information Security
    Shen, Wuqiang
    Liu, Ye
    Wu, Qinqin
    Tian, Yiqing
    Liu, Yuling
    Peng, Huaxi
    2018 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2018, : 3042 - 3047
  • [36] Information security: Technology and the law
    Marvin, CR
    Levinson, CK
    TOWARD AN ELECTRONIC PATIENT RECORD '98 CONFERENCE AND EXPOSITION, PROCEEDINGS - VOLS 1-3, 1998, : A123 - A126
  • [37] Confidentiality and security in information technology
    Lefton, AB
    GENERATIONS-JOURNAL OF THE AMERICAN SOCIETY ON AGING, 1997, 21 (03): : 50 - 52
  • [38] PERSPECTIVES IN INFORMATION TECHNOLOGY SECURITY
    HIGHLAND, HJ
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 13 : 440 - 446
  • [39] Standardization in Information Technology Security
    Fal’ O.M.
    Cybernetics and Systems Analysis, 2017, 53 (1) : 78 - 82
  • [40] Quantum information security technology
    Zhao, Sheng-Mei
    Yao, Jia
    Li, Fei
    Zheng, Bao-Yu
    Nanjing Youdian Xueyuan Xuebao/Journal of Nanjing Institute of Posts and Telecommunications, 2005, 25 (03): : 1 - 7