The Information Security for the Application of IoT Technology

被引:0
|
作者
Jiang, Jia [1 ]
Yang, Donghai [1 ]
机构
[1] Hebei Univ Sci & Technol, Sch Econ & Management, Shijiazhuang 050018, Peoples R China
来源
LISS 2014 | 2015年
关键词
IoT technology; Information security; Personal privacy; Countermeasures and suggestions;
D O I
10.1007/978-3-662-43871-8_243
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the wide use of IoT technology in the production and daily life, the problems of information security and privacy security have been gradually exposed. Based on the IoT technology architecture, we made a deep analysis of the security problems from the sensor layer, network layer and application layer respectively, and we try to find the key technical points and put forward the corresponding countermeasures and suggestions for the security problems in the above three layers, for example, the security problems of the terminal access mechanism and the routing attacks of wireless sensor networks for the sensor layer; the address space shortage and the denial of service due to network congestion for the network layer; personal privacy and unsound security standard for the application layer.
引用
收藏
页码:1687 / 1693
页数:7
相关论文
共 50 条
  • [41] User Acceptance of Information Technology: A Critical Review of Technology Acceptance Models and the Decision to Invest in Information Security
    Seuwou, Patrice
    Banissi, Ebad
    Ubakanma, George
    GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: THE SECURITY CHALLENGES OF THE CONNECTED WORLD, ICGS3 2017, 2016, 630 : 230 - 251
  • [42] Quantum measurement and its application in information security
    Wen, XJ
    Liu, Y
    Zhang, ZJ
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 4, 2005, : 314 - 317
  • [43] Information Security Risk Assessment Technology of Cyberspace: a Review
    Li Qianmu
    Zhang Hong
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11A): : 4677 - 4683
  • [44] IoT als Herausforderung für die InformationssicherheitIoT as a challenge in information security
    Ingrid Schaumüller-Bichl
    Andrea Kolberger
    e & i Elektrotechnik und Informationstechnik, 2016, 133 (7) : 319 - 323
  • [45] IoT and 5G Networks: A Discussion of SDN, NFV and Information Security
    Coêlho, Roger William
    Silva, Ronan Assumpção
    Martimiano, Luciana Andréia Fondazzi
    Leonardo, Elvio João
    Journal of the Brazilian Computer Society, 2024, 30 (01) : 212 - 227
  • [46] An Optimization Model of Product Selection in Information Security Technology System
    Qiu, Qi-Rong
    Pan, Zhi
    Peng, Wu-An
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 474 - 478
  • [47] An optimization model of product selection in information security technology system
    Qiu, Qi-Rong
    Zhang, Yong-Fang
    Han, Lu
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1141 - 1146
  • [48] TECHNOLOGY FOR INFORMATION AND CYBER SECURITY IN HIGHER EDUCATION INSTITUTIONS OF UKRAINE
    Nashynets-Naumova, Anfisa Yu
    Buriachok, Volodymyr L.
    Korshun, Natalia, V
    Zhyltsov, Oleksii B.
    Skladannyi, Pavlo M.
    Kuzmenko, Lidia, V
    INFORMATION TECHNOLOGIES AND LEARNING TOOLS, 2020, 77 (03) : 337 - 354
  • [49] Identity-based encryption: A new technology for information security
    Xu Yixian
    Gao Qiang
    Wu Jiang
    ICCSE'2006: Proceedings of the First International Conference on Computer Science & Education: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2006, : 561 - 564
  • [50] An Application of Probabilistic Risk Assessment to Information Security Audit
    Satoh, Naoki
    Kumamoto, Hiromitsu
    AIC '09: PROCEEDINGS OF THE 9TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS: RECENT ADVANCES IN APPLIED INFORMAT AND COMMUNICATIONS, 2009, : 436 - +