首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 328 毫秒
1.
物联网安全架构与技术路线研究   总被引:5,自引:0,他引:5  
文章回顾了物联网的概念和发展历程,讨论了如何理解物联网概念。介绍了物联网的体系结构,并指出物联网架构中有特色的网络技术是:6LoWPAN、EPCglobal和M2M。提出了物联网的安全架构,及一些思考,包括:物联网安全的总体概貌、物联网安全架构的层次模型、物联网安全设计的参考流程图。最后分析了物联网安全学科与信息安全学科以及物联网工程学科的关联。  相似文献   

2.
物联网信息模型与能力分析   总被引:1,自引:0,他引:1  
毛燕琴  沈苏彬 《软件学报》2014,25(8):1685-1695
虽然近几年物联网技术开发与应用快速增长,但物联网理论研究仍然处于发展阶段.物联网作为一个典型的信息与通信系统,不仅具有现有互联网的信息存储和传递的能力,而且具有物品信息的自动采集和处理能力.构建物联网信息模型是分析物联网特征能力的一种有效方法.根据国际电信联盟有关物联网的定义和特征描述,通过采用统一建模语言构建物联网信息模型,分析和验证了物联网的物品相关能力、自主操作能力以及隐私保护能力,讨论了物联网信息模型在物联网技术标准方面的指导性结论,分析了物联网信息模型在讨论有争议的物联网概念或观点方面的应用价值.  相似文献   

3.
The Internet of Things (IoT) is the latest web evolution that incorporates billions of devices that are owned by different organisations and people who are deploying and using them for their own purposes. IoT-enabled harnessing of the information that is provided by federations of such IoT devices (which are often referred to as IoT things) provides unprecedented opportunities to solve internet-scale problems that have been too big and too difficult to tackle before. Just like other web-based information systems, IoT must also deal with the plethora of Cyber Security and privacy threats that currently disrupt organisations and can potentially hold the data of entire industries and even countries for ransom. To realise its full potential, IoT must deal effectively with such threats and ensure the security and privacy of the information collected and distilled from IoT devices. However, IoT presents several unique challenges that make the application of existing security and privacy techniques difficult. This is because IoT solutions encompass a variety of security and privacy solutions for protecting such IoT data on the move and in store at the device layer, the IoT infrastructure/platform layer, and the IoT application layer. Therefore, ensuring end-to-end privacy across these three IoT layers is a grand challenge in IoT. In this paper, we tackle the IoT privacy preservation problem. In particular, we propose innovative techniques for privacy preservation of IoT data, introduce a privacy preserving IoT Architecture, and also describe the implementation of an efficient proof of concept system that utilises all these to ensure that IoT data remains private. The proposed privacy preservation techniques utilise multiple IoT cloud data stores to protect the privacy of data collected from IoT. The proposed privacy preserving IoT Architecture and proof of concept implementation are based on extensions of OpenIoT - a widely used open source platform for IoT application development. Experimental evaluations are also provided to validate the efficiency and performance outcomes of the proposed privacy preserving techniques and architecture.  相似文献   

4.
Systems based on the Internet of Things (IoT) are continuously growing in many areas such as smart cities, home environments, buildings, agriculture, industry, etc. Device mobility is one of the key aspects of these IoT systems, but managing it could be a challenge. Mobility exposes the IoT environment or Industrial IoT (IIoT) to situations such as packet loss, increased delay or jitter, dynamism in the network topology, new security threats, etc. In addition, there is no standard for mobility management for the most commonly used IoT protocols, such as MQTT or CoAP. Consequently, managing IoT mobility is a hard, error-prone and tedious task. However, increasing the abstraction level from which the IoT systems are designed helps to tackle the underlying technology complexity. In this regard, Model-driven development approaches can help to both reduce the IoT application time to market and tackle the technological complexity to develop IoT applications. In this paper, a Domain-Specific Language based on SimulateIoT is proposed for the design, code generation and simulation of IoT systems with mobility management for the MQTT protocol. The IoT systems generated integrate the sensors, actuators, fog nodes, cloud nodes and the architecture that supports mobility, which are deployed as microservices on Docker containers and composed suitability. Finally, two case studies focused on animal tracking and a Personal mobility device (PMD) based on bicycles IoT systems are presented to show the IoT solutions deployed.  相似文献   

5.
物联网服务作为信息世界软件服务通过物联网向现实世界的延伸,其在物联网系统具有重要的作用.然而,不同于传统Web服务,物联网服务具有现实感知、数据驱动、异构分布、时空相关等新特点,使得现有的服务模型不足以对物联网服务有效刻画,进而也不能满足物联网应用中的后续服务发现、服务卸载、服务组合等需求.在凝练分析物联网服务建模需求和已有物联网服务模型的基础上,提出了一种基于实体-数据的物联网服务建模框架,该框架提出了服务、实体、数据三元信息融合的物联网服务模型概念及概念关系,重点定义了服务、实体、数据的时空属性及时空依赖关系,以支持基于时空相关性的物联网服务关联表示与分析,并通过扩展OWL-S(ontology Web language for services)给出了基于实体-数据的物联网服务描述方式.最后,结合一个高速公路物联网应用案例对模型的使用方式和效果进行了讨论.  相似文献   

6.
医院物联网体系结构和关键技术研究   总被引:1,自引:0,他引:1  
医院物联网是物联网技术在医疗行业应用的集中体现。在简单介绍医院物联网基本概念的基础上,结合物联网机制和医院的实际特点,探讨了适用于医院物联网的体系结构,并分析了构建中的关键技术,包括医院物联网的标准建设、中间件技术及嵌入式电子病历的研究与设计等。  相似文献   

7.
物联网技术及其安全性研究   总被引:3,自引:0,他引:3  
针对物联网_技术的发展趋势问题,基于物联网的体系结构和关键技术,分析了物联网的安全需求与相关特性,构建了一个以RFID安全和隐私保护为重点的物联网安全框架,提出了应对物联网所面临的安全挑战的解决途径,最后对物联网未来发展趋势作了展望.  相似文献   

8.
物联网设备已经被广泛应用于各种产业场景中,中立的物联网设备和连接管理是物联网产业中急需突破的一个方向。本文首先分析了物联网设备管理的需求,介绍了一个实际的物联网设备管理系统的设计方案(包括服务器侧和网关的设计);其次,展示了该物联网设备管理系统的数据能力和性能测试结果;最后,对物联网设备管理系统的扩展需求进行了展望。  相似文献   

9.
Development of foundation models for Internet of Things   总被引:1,自引:0,他引:1  
With the advent of the Internet of Things (IoT) that offers capabilities to identify and connect worldwide physical objects into a unified system, the importance of modeling and processing IoT data has become significantly accentuated. IoT data is substantial in quantity, noisy, heterogeneous, inconsistent, and arrives at the system in a streaming fashion. Due to the unique characteristics of IoT data, the manipulation of IoT data for practical applications has encountered many fundamental challenging problems, such as data modeling and processing. This paper proposes the infrastructure for an IoT prototype system that aims to develop foundation models for IoT data. We illustrate major modules in the IoT prototype, as well as their functionalities, and provide our vision of the key techniques used for tacking the critical problems in each module.  相似文献   

10.
物联网技术研究进展   总被引:14,自引:5,他引:9  
李志宇 《计算机测量与控制》2012,20(6):1445-1448,1451
目前,物联网因其巨大的应用前景而受到各国政府、学术界和工业界的广泛重视,成为国内外信息通信领域的新研究热点;物联网产业己经成为推动世界经济增长的重要新兴产业,我国已将物联网的发展列为信息产业发展的下一个战略高点;首先总结了物联网的国内外研究进展,其次对物联网的概念、实现原理与体系结构进行了分析,归纳了物联网涉及的关键技术,然后介绍了物联网的一些典型应用,最后指出了物联网进一步研究的方向以及制约国内物联网发展的问题及解决对策。  相似文献   

11.

The term Internet of Things (IoT) represents all communicating countless heterogeneous devices to share data and resources via the internet. The speedy advance of IoT devices proposes limitless benefits, but it also brings new challenges regarding security and forensics. Likewise, IoT devices can generate a massive amount of data that desires integrity and security during its handling and processing in an efficient way. IoT devices and data can be vulnerable to various types of cyber-crimes at each IoT layer. For combating these cyber-crimes in IoT infrastructure, IoT forensic term has shown up. The IoT forensic is the process of performing digital forensic investigation in the IoT environment in a forensically sound and timely fashion manner. Sundry challenges face the IoT forensics that requires urgent solutions and mitigation methods; digital evidence needs to be collected, preserved, analyzed, processed, and reported in a trusted manner to be acceptable for presenting in the court of law. Preserving the evidence unchanged or tampered with is the most critical challenge in digital forensics. Authentication is another challenge facing digital forensics; who is allowed to deal with the evidence? One of the most recent solutions for supporting IoT forensics is the use of Blockchain. Using Blockchain in digital forensics guarantees data integrity, immutability, scalability, and security. Therefore, this paper presents a comprehensive review of IoT security and forensics with the integration with Blockchain technology. It begins by providing an inclusive discussion of IoT security, as well as the need for IoT forensics, and the concepts of Blockchain. Then, a review of Blockchain-based IoT security and forensics issues is presented. Finally, a discussion of open research directions is provided.

  相似文献   

12.
针对智能建筑的发展模式,结合智慧地球与物联网,本文阐述了物联网与视联网的相关技术,并分析了物联网在智能建筑中的应用,最后指出物联网、视联网是实现智能城市建筑的关键技术,而建筑智能化系统工程是物联网、视联网的应用基础。  相似文献   

13.
近年来,物联网大规模应用于智能制造、智能家居、智慧医疗等产业,物联网的安全问题日益突出,给物联网的发展带来了前所未有的挑战。安全测评技术是保障物联网安全的重要手段,在物联网应用的整个开发生命周期都需要进行安全测评工作,以保证物联网服务的安全性和健壮性。物联网节点面临计算能力、体积和功耗受限等挑战,智慧城市等应用场景提出了大规模泛在异构连接和复杂跨域的需求。本文首先总结了目前物联网中常用的安全测评方法和风险管理技术;然后从绿色、智能和开放三个方面分析物联网安全技术的发展现状和存在的安全问题,并总结了物联网安全测评面临的挑战以及未来的研究方向。  相似文献   

14.
物联网下的区块链访问控制综述   总被引:1,自引:0,他引:1  
史锦山  李茹 《软件学报》2019,30(6):1632-1648
随着物联网的不断发展,物联网的隐私保护问题引起了人们的重视,而访问控制技术是保护隐私的重要方法之一.物联网访问控制模型多基于中央可信实体的概念构建.去中心化的区块链技术解决了中心化模型带来的安全隐患.从物联网自身环境特点出发,提出物联网终端节点设备轻量级、物联网海量终端节点和物联网动态性这3个物联网下访问控制必须要解决的问题.然后,以这3个问题为核心,分析、总结了现有物联网中主流访问控制模型以及使用区块链后的访问控制模型分别是怎么解决这些问题的.最后总结出两类区块链访问控制模型以及将区块链用于物联网访问控制中的优势,并对基于区块链的物联网访问控制在未来需要解决的问题进行了展望.  相似文献   

15.
With the advent of the Internet of Things (IoT) that offers capabilities to identify and connect worldwide physical objects into a unified system, the importance of modeling and processing IoT data has become significantly accentuated. IoT data is substantial in quantity, noisy, heterogeneous, inconsistent, and arrives at the system in a streaming fashion. Due to the unique characteristics of IoT data, the manipulation of IoT data for practical applications has encountered many fundamental challenging problems, such as data modeling and processing. This paper proposes the infrastructure for an IoT prototype system that aims to develop foundation models for IoT data. We illustrate major modules in the IoT prototype, as well as their functionalities, and provide our vision of the key techniques used for tacking the critical problems in each module.  相似文献   

16.
近来,物联网已成为生活中炙手可热的名词,物联网技术的应用已成为推动信息化发展和产业变革的重要力量。物联网技术涉及众多领域,文章介绍了物联网的概念和基本特征,分析了物联网应用的现状,探讨了物联网发展的关键技术,并指出了未来物联网未来的发展机遇,为物联网的发展和建设提供参考。  相似文献   

17.
智能城市、智慧工厂等对物联网设备(Internet of Things,IoT)的性能和连接性提出了挑战。边缘计算的出现弥补了这些能力受限的设备,通过将密集的计算任务从它们迁移到边缘节点(Edge Node,EN),物联网设备能够在节约更多能耗的同时,仍保持服务质量。计算卸载决策涉及协作和复杂的资源管理,应该根据动态工作负载和网络环境实时确定计算卸载决策。采用模拟实验的方法,通过在物联网设备和边缘节点上都部署深度强化学习代理来最大化长期效用,并引入联盟学习来分布式训练深度强化学习代理。首先构建支持边缘计算的物联网系统,IoT从EN处下载已有模型进行训练,密集型计算任务卸载至EN进行训练;IoT上传更新的参数至EN,EN聚合该参数与EN处的模型得到新的模型;云端可在EN处获得新的模型并聚合,IoT也可以从EN获得更新的参数应用在设备上。经过多次迭代,该IoT能获得接近集中式训练的性能,并且降低了物联网设备和边缘节点之间的传输成本,实验证实了决策方案和联盟学习在动态物联网环境中的有效性。  相似文献   

18.
由于存在单点失效、规模受限等问题,传统中心化的解决方案很难满足物联网的安全需求。针对这种情况,提出一个面向IoT的基于智能合约的访问控制方案。通过引用IoT智能网关作为IoT设备的中心管理节点和公有区块链的全能节点,采用中心化与去中心化相结合、私有区块链和公有区块相结合、本地局部存储和外部公共存储相结合的方法加以实现。该方案实现IoT设备和IoT智能网关的相互认证,并实现用户对IoT设备中资源及存储在数据库中的数据的授权访问,具有去中心化、分布式优点,满足了规模性和安全性要求。  相似文献   

19.
物联网终端的显著特点是对外部世界进行感知与控制,但是传统安全威胁分析模型无法有效评估来自外部的攻击数据对物联网终端固件造成的危害。将新攻击面引入的攻击数据作为分析对象,通过对攻击数据在固件中的完整传播路径和交互过程进行建模,构建面向新攻击面的物联网终端固件安全威胁模型FSTM,从而分析物联网终端固件所面临的潜在威胁。分析结果表明,FSTM模型能有效描述物联网与物理世界紧耦合、与业务强相关的特性,为面向新攻击面的物联网终端安全检测技术研究提供理论指导。  相似文献   

20.
The vision of the Internet of Things (IoT) foresees a future Internet incorporating smart physical objects that offer hosted functionality as IoT services. These services when integrated with the traditional enterprise level services form the creation of ambient intelligence for a wide range of applications. To facilitate seamless access and service life cycle management of large, distributed and heterogeneous IoT resources, service oriented computing and resource oriented approaches have been widely used as promising technologies. However, a reference architecture integrating IoT services into either of these two technologies is still an open research challenge. In this article, we adopt the resource oriented approach to provide an end-to-end integration architecture of front-end IoT devices with the back-end business process applications. The proposed architecture promises a programmer friendly access to IoT services, an event management mechanism to propagate context information of IoT devices, a service replacement facility upon service failure, and a decentralized execution of the IoT aware business processes.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号