检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:孙夏声[1] 李赛野 SUN Xia-sheng;LI Sai-ye(The 30th Institute of CETC,Chengdu Sichuan 610041,China)
机构地区:[1]中国电子科技集团公司第三十研究所,四川成都610041
出 处:《通信技术》2020年第9期2301-2305,共5页Communications Technology
摘 要:物联网的出现对社会生活的方方面面产生了极大影响,其蓬勃发展的同时也引入了新的安全问题。当前国内可信计算进入加速发展阶段,将可信计算技术应用到物联网信任链管理中,有效增强物联网系统的安全性。分析可信计算信任链的建立过程,基于PUF物理不可克隆技术,结合X509公钥密码体制,实现物联网环境下的信任链管理体系,从而提供一种具备可信终端防护能力和可信网络接入管理能力的方案,以解决物联网终端存在的内外部仿冒、篡改等安全问题。最后,对该方案的应用和推广价值进行了描述。The emergence of the IoT has a great impact on all aspects of social life,and its booming development has also introduced new security issues.As domestic trusted computing has entered a stage of accelerated development,the application of trusted computing technology to the management of the IoT trust chain can effectively enhance the security of the IoT system.By analyzing the establishment process of trusted computing trust chain,based on the PUF physical unclonable function technology,combined with the X509 public key cryptosystem,the trust chain management system in IoT environment is realized,thereby providing a solution with trusted terminal protection capability and trusted network connection management capability,so as to solve the internal and external counterfeiting,tampering and other security issues existing in the IoT terminal.Finally,the application and promotion value of the program are described.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.30