电信科学 ›› 2017, Vol. 33 ›› Issue (10): 10-18.doi: 10.11959/j.issn.1000-0801.2017270

• 专题:物联网技术与应用 • 上一篇    下一篇

可信物联网架构模型

殷安生1,张世君2   

  1. 1 南京邮电大学,江苏 南京 210003
    2 中国电信股份有限公司连云港分公司,江苏 南京 210037
  • 修回日期:2017-09-22 出版日期:2017-10-01 发布日期:2017-11-13
  • 作者简介:殷安生(1982-),男,博士,南京邮电大学副研究员,主要研究方向为网络安全与评估。|张世君(1980-),男,中国电信股份有限公司连云港分公司网络操作维护中心主任、工程师,主要研究方向为电信大数据挖掘与应用。
  • 基金资助:
    江苏省教育厅高校自然科学研究面上项目(17KJB520026)

A trusted IoT architecture model

Ansheng YIN1,Shijun ZHANG2   

  1. 1 Nanjing University of Posts and Telecommunications,Nanjing 210003,China
    2 Lianyungang Branch of China Telecom Co.,Ltd.,Nanjing 210037,China
  • Revised:2017-09-22 Online:2017-10-01 Published:2017-11-13
  • Supported by:
    Natural Science Fund for Colleges and Universities in Jiangsu Province(17KJB520026)

摘要:

物联网已经在世界范围内得到了广泛的关注和发展,其安全性也面临严重威胁。然而由于物联网本身的特性,很多在互联网领域的安全措施不能直接照搬过来。目前的安全策略主要是针对物联网受到的威胁逐一寻找解决方案,协同机制分散。面对日益智能化、系统化、综合化的安全威胁,提出一种三元两层的可信物联网架构,根据物联网的功能设计一种全程可信安全机制,从传感器设备的软件及硬件的完整性和安全性检查开始,将可信链依次传递,直到应用层,并在应用层根据行为可信实现数据的处理和应用。同时将控制功能和数据功能分开,不同的安全策略之间相互协作、相互检验,从而有效提高物联网应对安全威胁的能力。

关键词: 物联网, 可信, 架构

Abstract:

The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.

Key words: internet of things, trusted, architecture

中图分类号: 

No Suggested Reading articles found!