A Security Scheme Research of the Internet of Things Based on the SA/NIA Architecture

Article Preview

Abstract:

This paper analyses the traditional three-layer architecture of the Internet of things, proposes the SA/NIA five-layer architecture from the perspective of security based on two lower layers (Sensing layer, Access layer) and three higher layers (Network layer, Intermediary layer, Application layer), investigates security threats of all layers on the basis of SA/NIA and puts forward corresponding security schemes, so as to construct a safe and reliable system of the Internet of things.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

291-296

Citation:

Online since:

August 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Greatwall Strategy Consultant, Z-Park Internet of things Industry Alliance. Development Research of Internet of things Industry in China of 2011[R]. Beijing, (2011).

Google Scholar

[2] The People's Government of Shandong Province. The Internet of things Industry Development Plan of Shandong from 2010 to 2015[R]. Jinan, (2010).

Google Scholar

[3] Shen Subin, Fan Quli, Zong Ping, etc. Study on the Architecture and Associated Technologies for Internet of Things[J]. Journal of Nanjing University of Posts and Telecommunications(Natural Science), 2009, (06): 1-11.

Google Scholar

[4] Zhou Yongbin, Feng Deng. Design and Analysis of Cryptographic Protocols for RFID[J]. Chinese Journal of Computers, 2006, (04): 81-84.

Google Scholar

[5] Security and Privacy Challenges in the Internet of Things[J]. Electronic Communications of the EASST, (2009).

Google Scholar

[6] WOLFW. Cyber-physical Systems[J]. Computer, 2009, (3): 57-59.

Google Scholar