A Survey on the Internet of Things Security

被引:375
作者
Zhao, Kai [1 ]
Ge, Lina [1 ,2 ]
机构
[1] Guangxi Univ Nationalities, Sch Informat Sci & Engn, Guangxi, Peoples R China
[2] Guangxi Teacher Educ Univ, Sci Comp & Intelligent Informat Proc Guangxi High, Nanning 530023, Guangxi, Peoples R China
来源
2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS) | 2013年
关键词
Internet of Things; Internet of Things Security; perception layer;
D O I
10.1109/CIS.2013.145
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security issues of the Internet of Things (IoT) are directly related to the wide application of its system. Beginning with introducing the architecture and features of IoT security, this paper expounds several security issues of IoT that exist in the three-layer system structure, and comes up with solutions to the issues above coupled with key technologies involved. Among these safety measures concerned, the ones about perception layer are particularly elaborated, including key management and algorithm, security routing protocol, data fusion technology, as well as authentication and access control, etc.
引用
收藏
页码:663 / 667
页数:5
相关论文
共 17 条
  • [1] [Anonymous], COMPUTER APPL
  • [2] [Anonymous], CHINESE J ELECT
  • [3] Gao Hongbo, 2012, MANUFACTURING AUTOMA, V34
  • [4] Jara Antonio J., 2009, 2009 International Conference on Computational Science and Engineering (CSE), P879, DOI 10.1109/CSE.2009.126
  • [5] Lei Li, 2011, NET SECURITY TECHNOL, P34
  • [6] Li Shancang, 2008, PRINCIPLE APPL WIREL
  • [7] Liu D., 2003, MULTILEVEL MUTESLA B
  • [8] Ning H., 2012, ADV INTERNET THINGS, V2, P1, DOI [10.4236/ait.2012.21001, DOI 10.4236/AIT.2012.21001]
  • [9] SPINS: Security protocols for sensor networks
    Perrig, A
    Szewczyk, R
    Tygar, JD
    Wen, V
    Culler, DE
    [J]. WIRELESS NETWORKS, 2002, 8 (05) : 521 - 534
  • [10] Shen Liang, 2012, 27 NAT COMP SEC AC C, P38