物聯(lián)網(wǎng)安全與隱私問題探究.doc




約46頁DOC格式手機打開展開
物聯(lián)網(wǎng)安全與隱私問題探究,2.88萬字我自己的畢業(yè)論文,原創(chuàng)的,已經(jīng)通過校內(nèi)系統(tǒng)檢測,僅在本站獨家出售,重復率低,大家放心下載使用摘要 物聯(lián)網(wǎng)(internet of things)被預言為繼互聯(lián)網(wǎng)之后全球信息產(chǎn)業(yè)的又一次科技與經(jīng)濟浪潮,受到各國政府、企業(yè)和學術界的重視,美國、歐盟、日本等甚至將其納入國家和區(qū)域信息化戰(zhàn)略...


內(nèi)容介紹
此文檔由會員 淘寶大夢 發(fā)布
物聯(lián)網(wǎng)安全與隱私問題探究
2.88萬字
我自己的畢業(yè)論文,原創(chuàng)的,已經(jīng)通過校內(nèi)系統(tǒng)檢測,僅在本站獨家出售,重復率低,大家放心下載使用
摘要 物聯(lián)網(wǎng)(Internet of Things)被預言為繼互聯(lián)網(wǎng)之后全球信息產(chǎn)業(yè)的又一次科技與經(jīng)濟浪潮,受到各國政府、企業(yè)和學術界的重視,美國、歐盟、日本等甚至將其納入國家和區(qū)域信息化戰(zhàn)略。我國早在99年就啟動了物聯(lián)網(wǎng)核心傳感網(wǎng)技術研究,發(fā)展物聯(lián)網(wǎng)也早已提升到國家戰(zhàn)略的高度。隨著物聯(lián)網(wǎng)的逐漸普及與實際應用,其在帶來方便快捷的同時,安全與隱私問題也越來越引起人們的關注,甚至能左右各個國家的戰(zhàn)略地位,該問題的重要性不言而喻。
從物聯(lián)網(wǎng)的信息處理過程來看,感知信息經(jīng)過采集、匯聚、融合、傳輸、決策與控制等過程,整個信息處理的過程體現(xiàn)了物聯(lián)網(wǎng)安全的特征與要求,也揭示了所面臨的安全問題。一是感知網(wǎng)絡的信息采集、傳輸與信息安全問題。二是核心網(wǎng)絡的傳輸與信息安全問題。三是物聯(lián)網(wǎng)業(yè)務的安全問題。本文根據(jù)物聯(lián)網(wǎng)安全特征,重點分析了感知網(wǎng)絡信息采集,傳輸?shù)倪^程所存在的安全問題,并提出了相應的安全策略。
RFID(射頻識別系統(tǒng))作為物品傳遞自身信息的途徑,是一種高級的非接觸式識別技術。它具有其優(yōu)于傳統(tǒng)條碼的幾個特性,一是無需“可視”讀取,實現(xiàn)遠距離自動識別,避免了人工干預,特別是在惡劣環(huán)境條件下。二是兼可識別靜比、運動的物品。三是能夠同時識別多個標簽,提高識別效率。作為物聯(lián)網(wǎng)的重要組成部分,其安全問題也是物聯(lián)網(wǎng)安全問題的一部分。本文分析了RFID的結構與工作原理,對RFID所面臨的安全問題進行深入探究。
本文列出了幾種比較流行的密碼體制,也分析了其特點。為了解決RFID系統(tǒng)的安全和成本問題,本文提出了一種基于超橢圓曲線密碼體制的RFID安全協(xié)議。利用新的簽密算法,在RFID閱讀器和電子標簽之間實現(xiàn)了信息的加密和認證。與現(xiàn)有的簽密算法比較,該協(xié)議具有前向安全和可公開驗證,能避免惡意信息的攻擊。協(xié)議的安全性和性能分析結果表明,該協(xié)議達到了RFID系統(tǒng)高隱私安全和低標簽成本的結合。
關鍵詞:物聯(lián)網(wǎng) 安全 RFID 超橢圓曲線密碼體制
Security and Privacy Issues of the Internet of Things
Abstract IOT (Internet of Things) is predicted to continue another wave of the global information technology industry and economy after the Internet, also be much accounted of governments, enterprises and academic. The United States, European Union, Japan, and even bring it into their national and regional information strategy. In the early 1999, our country started the physical sensor network research core networking technologies, the development of things have long been elevated to the national strategy. With the increasing popularity and the practical application of things, which brings convenience at the same time, security and privacy issues are increasingly a cause for concern, even about each country's strategic position, the importance of the problem is self-evident.
Things from the information processing point of view, the perception of information through the collection, aggregation, integration, transmission, and other decision-making and control process, the whole process of information processing in networking security reflects the characteristics and requirements, but also reveals the security problems faced by . The first one is perception of information collection, transmission network and information security problems. The second one is transmission and core network information security problems. The third one is security networking business. Based on the security features of things, analyzes the security-aware network information collection, transmission of the existence of the process, and the corresponding security policy.
RFID (radio frequency identification system) as the goods pass its own way of information, is an advanced non-contact identification technology. It is superior to the conventional bar code has its several features, one without "visible" Read achieve remote automatic recognition to avoid manual intervention, especially in harsh environmental conditions. Secondly is can recognizable items whet. Thirdly is can simultaneously identify multiple tags, to improve recognition efficiency. As an important part of things, its security issues are also part of the security issues of things. This paper analyzes the structure and working principle of RFID, RFID security issues faced by in-depth inquiry.
This article lists some of the popular cryptosystem and analyzes the characteristics.To solve cost and security problems of RFID system,an RFID security protocol based on hyperelliptic curve cryptosystem is proposed. The protocol realizes encryption and certification of data between RFID tag and reader by using new signcryption. The new protocol has the capability of forward secrecy and public verifiability and avoids the attack of evil information compared with the exciting signcryption. The security and performance of the protocol is analyzed, results prove that the new protocol achieves the integration of low tag cost and high security of RFID system.
Key words:Internet of things Security RFID Hyperelliptic curve cryptosystem
目 錄
第一章 緒論 6
1.1物聯(lián)網(wǎng)安全與隱私課題研究的相關內(nèi)容和意義 6
1.2物聯(lián)網(wǎng)國內(nèi)外研究發(fā)展現(xiàn)狀 8
1.3本篇文章的主要研究內(nèi)容與組織結構 11
第二..
2.88萬字
我自己的畢業(yè)論文,原創(chuàng)的,已經(jīng)通過校內(nèi)系統(tǒng)檢測,僅在本站獨家出售,重復率低,大家放心下載使用
摘要 物聯(lián)網(wǎng)(Internet of Things)被預言為繼互聯(lián)網(wǎng)之后全球信息產(chǎn)業(yè)的又一次科技與經(jīng)濟浪潮,受到各國政府、企業(yè)和學術界的重視,美國、歐盟、日本等甚至將其納入國家和區(qū)域信息化戰(zhàn)略。我國早在99年就啟動了物聯(lián)網(wǎng)核心傳感網(wǎng)技術研究,發(fā)展物聯(lián)網(wǎng)也早已提升到國家戰(zhàn)略的高度。隨著物聯(lián)網(wǎng)的逐漸普及與實際應用,其在帶來方便快捷的同時,安全與隱私問題也越來越引起人們的關注,甚至能左右各個國家的戰(zhàn)略地位,該問題的重要性不言而喻。
從物聯(lián)網(wǎng)的信息處理過程來看,感知信息經(jīng)過采集、匯聚、融合、傳輸、決策與控制等過程,整個信息處理的過程體現(xiàn)了物聯(lián)網(wǎng)安全的特征與要求,也揭示了所面臨的安全問題。一是感知網(wǎng)絡的信息采集、傳輸與信息安全問題。二是核心網(wǎng)絡的傳輸與信息安全問題。三是物聯(lián)網(wǎng)業(yè)務的安全問題。本文根據(jù)物聯(lián)網(wǎng)安全特征,重點分析了感知網(wǎng)絡信息采集,傳輸?shù)倪^程所存在的安全問題,并提出了相應的安全策略。
RFID(射頻識別系統(tǒng))作為物品傳遞自身信息的途徑,是一種高級的非接觸式識別技術。它具有其優(yōu)于傳統(tǒng)條碼的幾個特性,一是無需“可視”讀取,實現(xiàn)遠距離自動識別,避免了人工干預,特別是在惡劣環(huán)境條件下。二是兼可識別靜比、運動的物品。三是能夠同時識別多個標簽,提高識別效率。作為物聯(lián)網(wǎng)的重要組成部分,其安全問題也是物聯(lián)網(wǎng)安全問題的一部分。本文分析了RFID的結構與工作原理,對RFID所面臨的安全問題進行深入探究。
本文列出了幾種比較流行的密碼體制,也分析了其特點。為了解決RFID系統(tǒng)的安全和成本問題,本文提出了一種基于超橢圓曲線密碼體制的RFID安全協(xié)議。利用新的簽密算法,在RFID閱讀器和電子標簽之間實現(xiàn)了信息的加密和認證。與現(xiàn)有的簽密算法比較,該協(xié)議具有前向安全和可公開驗證,能避免惡意信息的攻擊。協(xié)議的安全性和性能分析結果表明,該協(xié)議達到了RFID系統(tǒng)高隱私安全和低標簽成本的結合。
關鍵詞:物聯(lián)網(wǎng) 安全 RFID 超橢圓曲線密碼體制
Security and Privacy Issues of the Internet of Things
Abstract IOT (Internet of Things) is predicted to continue another wave of the global information technology industry and economy after the Internet, also be much accounted of governments, enterprises and academic. The United States, European Union, Japan, and even bring it into their national and regional information strategy. In the early 1999, our country started the physical sensor network research core networking technologies, the development of things have long been elevated to the national strategy. With the increasing popularity and the practical application of things, which brings convenience at the same time, security and privacy issues are increasingly a cause for concern, even about each country's strategic position, the importance of the problem is self-evident.
Things from the information processing point of view, the perception of information through the collection, aggregation, integration, transmission, and other decision-making and control process, the whole process of information processing in networking security reflects the characteristics and requirements, but also reveals the security problems faced by . The first one is perception of information collection, transmission network and information security problems. The second one is transmission and core network information security problems. The third one is security networking business. Based on the security features of things, analyzes the security-aware network information collection, transmission of the existence of the process, and the corresponding security policy.
RFID (radio frequency identification system) as the goods pass its own way of information, is an advanced non-contact identification technology. It is superior to the conventional bar code has its several features, one without "visible" Read achieve remote automatic recognition to avoid manual intervention, especially in harsh environmental conditions. Secondly is can recognizable items whet. Thirdly is can simultaneously identify multiple tags, to improve recognition efficiency. As an important part of things, its security issues are also part of the security issues of things. This paper analyzes the structure and working principle of RFID, RFID security issues faced by in-depth inquiry.
This article lists some of the popular cryptosystem and analyzes the characteristics.To solve cost and security problems of RFID system,an RFID security protocol based on hyperelliptic curve cryptosystem is proposed. The protocol realizes encryption and certification of data between RFID tag and reader by using new signcryption. The new protocol has the capability of forward secrecy and public verifiability and avoids the attack of evil information compared with the exciting signcryption. The security and performance of the protocol is analyzed, results prove that the new protocol achieves the integration of low tag cost and high security of RFID system.
Key words:Internet of things Security RFID Hyperelliptic curve cryptosystem
目 錄
第一章 緒論 6
1.1物聯(lián)網(wǎng)安全與隱私課題研究的相關內(nèi)容和意義 6
1.2物聯(lián)網(wǎng)國內(nèi)外研究發(fā)展現(xiàn)狀 8
1.3本篇文章的主要研究內(nèi)容與組織結構 11
第二..
TA們正在看...
- db510600t03-2010食品質(zhì)量安全監(jiān)督管理規(guī)范.doc
- db51248-2005建昌黑山羊.doc
- db51481-2005樂至黑山羊.doc
- db51t269-2006豬用濃縮飼料.doc
- db51t271.1-2009城鎮(zhèn)生活污水凈化沼氣池配套安裝規(guī)...doc
- db51t271.3-2009農(nóng)村戶用沼氣池驗收規(guī)范.doc
- db51t312-2009農(nóng)村戶用預制構件沼氣池施工規(guī)范.doc
- db51t385-2003無公害畜產(chǎn)品肉牛生產(chǎn)技術規(guī)程.doc
- db51t386-2003無公害畜產(chǎn)品肉羊生產(chǎn)技術規(guī)程.doc
- db51t460-2004綠色食品香菇生產(chǎn)技術規(guī)程.doc