Telecommunications Science ›› 2017, Vol. 33 ›› Issue (10): 10-18.doi: 10.11959/j.issn.1000-0801.2017270

• Topic:Internet of things technology and application • Previous Articles     Next Articles

A trusted IoT architecture model

Ansheng YIN1,Shijun ZHANG2   

  1. 1 Nanjing University of Posts and Telecommunications,Nanjing 210003,China
    2 Lianyungang Branch of China Telecom Co.,Ltd.,Nanjing 210037,China
  • Revised:2017-09-22 Online:2017-10-01 Published:2017-11-13
  • Supported by:
    Natural Science Fund for Colleges and Universities in Jiangsu Province(17KJB520026)

Abstract:

The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.

Key words: internet of things, trusted, architecture

CLC Number: 

No Suggested Reading articles found!