谷歌浏览器插件
订阅小程序
在清言上使用

Study Of Things Networking Perception Layer Security Authentication And Key Management

INTERNATIONAL CONFERENCE ON ELECTRICAL AND CONTROL ENGINEERING (ICECE 2015)(2015)

引用 0|浏览0
暂无评分
摘要
The Internet of things technology has the function of "double-edged sword". On the one hand, brings convenience to us, but also bring many unsafe factors in hand. In more and more emphasis on the dignity of life and quality of life today, with production, life of Internet of things people's security have become increasingly prominent, especially the authentication and key management perception layer now has been the key problem has become one of the research of the Internet of things, it is the basic guarantee to the safe operation of the Internet of things. This paper introduces the concept and architecture of the Internet of things, and has made the analysis on the security problems faced. Due to the RFID and wireless sensor network as the representative of the things networking perception layer has the characteristics of limited computing and storage capacity, and its present situation of endemic and security mechanism in the Internet of things is still relatively weak, to provide authentication technology and key management model for the sensing layer.
更多
查看译文
关键词
Internet of things, network security, perception layer, key management
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要