物联网服务安全与隐私保护关键技术

CONVERTER Pub Date : 2021-01-01 DOI:10.17762/converter.158
Dongxian Yu, Jiatao Kang, Junlei Dong
{"title":"物联网服务安全与隐私保护关键技术","authors":"Dongxian Yu, Jiatao Kang, Junlei Dong","doi":"10.17762/converter.158","DOIUrl":null,"url":null,"abstract":"The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ideas of the Internet of things are perception, control, transmission and intelligence. Through technical means to achieve the coordination between things, people and things, and people, so as to form a larger complex network system on the basis of sensor network, Internet and mobile communication network. The data Shared by Internet of things information is closely related to personal life behaviors, and the information has a greater perceived correlation with each other. This kind of sensibility and sensitivity put forward higher requirements for the security and privacy protection of Internet of things information sharing. However, due to the characteristics of network structure, terminal equipment, communication mode and application scenario, some security and privacy issues unique to the Internet of things cannot be solved directly through existing Internet security technologies. It is necessary to conduct in-depth research on the key technologies of Internet of things security and privacy protection. This article briefly describes the Internet of things security and privacy issues, then, it gives the research and application status of Internet of things security and privacy protection at home and abroad, then lists the key technical problems in Internet of things security and privacy protection. And for communication between large scale collaborative services. Based on publish/subscribe paradigm, this paper constructs collaborative communication facilities of Internet of things services suitable for large-scale distribution, and an access control architecture for managing service synergy interactions, achieve confidentiality of data exchange between services and privacy protection of service policies.","PeriodicalId":10707,"journal":{"name":"CONVERTER","volume":"29 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Key Technologies of IoT Service Security and Privacy Protection\",\"authors\":\"Dongxian Yu, Jiatao Kang, Junlei Dong\",\"doi\":\"10.17762/converter.158\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ideas of the Internet of things are perception, control, transmission and intelligence. Through technical means to achieve the coordination between things, people and things, and people, so as to form a larger complex network system on the basis of sensor network, Internet and mobile communication network. The data Shared by Internet of things information is closely related to personal life behaviors, and the information has a greater perceived correlation with each other. This kind of sensibility and sensitivity put forward higher requirements for the security and privacy protection of Internet of things information sharing. However, due to the characteristics of network structure, terminal equipment, communication mode and application scenario, some security and privacy issues unique to the Internet of things cannot be solved directly through existing Internet security technologies. It is necessary to conduct in-depth research on the key technologies of Internet of things security and privacy protection. This article briefly describes the Internet of things security and privacy issues, then, it gives the research and application status of Internet of things security and privacy protection at home and abroad, then lists the key technical problems in Internet of things security and privacy protection. And for communication between large scale collaborative services. Based on publish/subscribe paradigm, this paper constructs collaborative communication facilities of Internet of things services suitable for large-scale distribution, and an access control architecture for managing service synergy interactions, achieve confidentiality of data exchange between services and privacy protection of service policies.\",\"PeriodicalId\":10707,\"journal\":{\"name\":\"CONVERTER\",\"volume\":\"29 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"CONVERTER\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17762/converter.158\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"CONVERTER","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17762/converter.158","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

工业领域的物联网以其巨大的应用前景,引起了政府、学术界和产业界的广泛关注。物联网的核心思想是感知、控制、传输和智能。通过技术手段实现物与物、人与物、人与人之间的协调,从而在传感器网络、互联网和移动通信网络的基础上形成更大的复杂网络系统。物联网信息共享的数据与个人生活行为密切相关,信息之间具有较大的感知相关性。这种敏感性和敏感性对物联网信息共享的安全性和隐私保护提出了更高的要求。然而,由于网络结构、终端设备、通信方式和应用场景的特点,一些物联网特有的安全和隐私问题并不能通过现有的互联网安全技术直接解决。有必要对物联网安全和隐私保护的关键技术进行深入研究。本文简要介绍了物联网安全与隐私问题,然后给出了国内外物联网安全与隐私保护的研究和应用现状,然后列举了物联网安全与隐私保护中的关键技术问题。并用于大规模协作服务之间的通信。基于发布/订阅模式,构建了适合大规模分布的物联网服务协同通信设施,以及管理服务协同交互的访问控制架构,实现了服务间数据交换的保密性和服务策略的隐私保护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ideas of the Internet of things are perception, control, transmission and intelligence. Through technical means to achieve the coordination between things, people and things, and people, so as to form a larger complex network system on the basis of sensor network, Internet and mobile communication network. The data Shared by Internet of things information is closely related to personal life behaviors, and the information has a greater perceived correlation with each other. This kind of sensibility and sensitivity put forward higher requirements for the security and privacy protection of Internet of things information sharing. However, due to the characteristics of network structure, terminal equipment, communication mode and application scenario, some security and privacy issues unique to the Internet of things cannot be solved directly through existing Internet security technologies. It is necessary to conduct in-depth research on the key technologies of Internet of things security and privacy protection. This article briefly describes the Internet of things security and privacy issues, then, it gives the research and application status of Internet of things security and privacy protection at home and abroad, then lists the key technical problems in Internet of things security and privacy protection. And for communication between large scale collaborative services. Based on publish/subscribe paradigm, this paper constructs collaborative communication facilities of Internet of things services suitable for large-scale distribution, and an access control architecture for managing service synergy interactions, achieve confidentiality of data exchange between services and privacy protection of service policies.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Idea of the Perfect Person in the Views of Middle Eastern Thinkers Exercise Fatigue Induce the Oxidative Stress and the Expression of mGluR 4 and mGluR 5 on the Ventrolateral Thalamus in Rats Hot Analysis and Development Trends of Technology Transfer Research in Universities At Home and Abroad Mobile Agent Based Project Management System An Approach to 1/f Noise Detection Based on Adaptive T-ATFPF Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1