当前位置>主页 > 期刊在线 > 信息安全 >

信息安全2018年9期

基于物联网的隐私保护与信息安全增强模型的框架分析
徐毅
(西北政法大学 商学院,陕西 西安 710122)

摘  要:目前,物联网技术还处于发展初期,但是已呈现出快速发展的趋势。作为一个新事物,解决隐私和安全问题将成为物联网能否被社会接受的关键。本文主要对基于物联网的隐私保护和信息安全增强模型进行了框架分析,并提出以下解决方案:(1)当请求被转发到数据更新模块时,数据更新模块需要根据请求的类型确定在存储层和可信第三方上执行哪些操作。(2)发 送相应的操作指令,因为认证模块负责验证操作,临时数据管理模块负责对最近更新的数据进行分组。(3)对监控存储层中每个数据包的剩余数据量以及额外伪造数据进行定时恢复。然而,物联网技术还处在不断发展的过程中,许多新的安全问题需要继续研究和讨论。


关键词:通信技术;物联网;信息安全;系统体系结构



中图分类号:TP391.44;TN915.08         文献标识码:A         文章编号:2096-4706(2018)09-0158-05


Framework Analysis of Privacy Protection and Information Security EnhancementModel Based on Internet of Things
XU Yi
(Northwest University of Political Science and Law Business School,Xi’an 710122,China)

Abstract:At present,the technology of the internet of things is still in the early stage of development,but it has shown a trendof rapid development. As a new thing,solving the problem of privacy and security will be the key to whether the internet of things can beaccepted by the society. In this paper,the author makes a framework analysis of privacy protection and information security enhancementmodel based on internet of things. In this paper,we propose the solution from the following aspects.(1)When the request is forwardedto the data update module,the data update module needs to determine which operations are performed on the storage layer and trustedthird parties based on the type of request.(2)Send the corresponding operation instructions,because the authentication module isresponsible for the verification operation,the temporary data management module is responsible for the latest update of the data grouping.(3)Surveillance on the remaining data volume of each packet in the storage layer,timing recovery of extra forgery data. However,thetechnology of the internet of things is still developing,and there are still many new security problems that we need to continue to studyand discuss.

Keywords:communication technology;internet of things;information security;system architecture


参考文献

[1] SK Datta,C Bonnet. Extending DataTweet IoT Architecturefor Virtual IoT Devices [J].IEEE International Conference on Internet ofThings,2018:689-694.

[2] X Li,K Ma,S George,et al. Enabling Internet-of-Things:Opportunities brought by emerging devices,circuits,and architectures [J].IFIP/IEEE International Conference on Very Large Scale Integration,2016:1-23.

[3] KARANDE S S,Wang,Zheng,SADJADPOUR H R,et al. Optimal unicast capacity of random geometric graphs:Impact ofmultipacket transmission and reception [J].IEEE Journal on SelectedAreas in Communications,2009,27(7):1180-1191.

[4] TAGHIZADEH-MEHRJARDI R,NABIOLLAHI K,MINASNY B,et al. Comparing data mining classifiers to predict spatialdistribution of USDA-family soil groups in Baneh region,Iran [J].
Geoderma,2015:67-77.

[5] FRANCESCHETTI M,MINERO P,MIGLIORE MD. Thecapacity of wireless networks:Information-theoretic and physical limits [J].IEEE Transactions on Information Theory,2009,55(8):3413-3424.

[6] Bianchi G. Performance analysis of IEEE 802.11 distributedcoordinat-eon function [J].IEEE Journal on Selected Areas inCommunications,18(3):535-547.

[7] A Markus,G Kecskemeti,A Kertesz. Flexible Representationof IoT Sensors for Cloud Simulators [J].Euromicro InternationalConference on Parallel,2017:199-203.

[8] YE Song,Y Liu,S Fang,et al.Research on applications ofthe internet of things in the smart grid [J].International Conference onIntelligent Human-Machine Systems and Cybernetics,2015,2:178-181.

[9] Fei Tao. IoT-Based Intelligent Perception and Access ofManufacturing Resource Toward Cloud Manufacturing [J].IndustrialInformatics,IEEE Transactions on,2014,10(2):1547-1557.

[10] F Tila,DH Kim. Semantic IoT System for IndoorEnvironment Control–A Sparql and SQL based hybrid model [J].Green& Smart Technology,2015:678-683.

[11] Y Zhang,H Wang,Y Xie. An intelligent hybrid model forpower flow optimization in the cloud-IOT electrical distribution network [J].Cluster Computing,2017:1-10.


作者简介:徐毅(1978.07-)男,汉族,陕西富平人,计算机应用专业硕士,讲师,研究方向:信息安全、专家系统。