A trusted IoT architecture model
The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainl...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2017-10-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017270/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530224113614848 |
---|---|
author | Ansheng YIN Shijun ZHANG |
author_facet | Ansheng YIN Shijun ZHANG |
author_sort | Ansheng YIN |
collection | DOAJ |
description | The internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively. |
format | Article |
id | doaj-art-8809bb2bee7c46199646a3e5b90ac194 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2017-10-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-8809bb2bee7c46199646a3e5b90ac1942025-01-15T03:05:56ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012017-10-0133101859599421A trusted IoT architecture modelAnsheng YINShijun ZHANGThe internet of things (IoT) has been widely concerned and developed in the world,and its security has been paid more and more attention.However,due to the characteristics of the IoT itself,a lot of security measures in the internet field can’t be applied directly.The current security strategy mainly provide solutions according to the threat of the IoT one by one.In face of increasingly intelligent,systematic,integrated security threats,a trusted IoT architecture of two layers and tri-elements,which brought about a whole trusted security mechanism according to the function of IoT.Starting with the integrity and safety inspection of hardware and software of sensor devices,the trusted chain was transmitted until the application layer,and data was processed according to behavior trusted value in application layer.At the same time,the control function and the data function were separated,and the security strategies cooperated and verified with each other,therefore improving the ability of the IoT to deal with security threats effectively.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017270/Internet of thingstrustedarchitecture |
spellingShingle | Ansheng YIN Shijun ZHANG A trusted IoT architecture model Dianxin kexue Internet of things trusted architecture |
title | A trusted IoT architecture model |
title_full | A trusted IoT architecture model |
title_fullStr | A trusted IoT architecture model |
title_full_unstemmed | A trusted IoT architecture model |
title_short | A trusted IoT architecture model |
title_sort | trusted iot architecture model |
topic | Internet of things trusted architecture |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2017270/ |
work_keys_str_mv | AT anshengyin atrustediotarchitecturemodel AT shijunzhang atrustediotarchitecturemodel AT anshengyin trustediotarchitecturemodel AT shijunzhang trustediotarchitecturemodel |