引用本文: |
-
王雅哲,张城毅,霍冬冬,李佳琳.IoT智能设备安全威胁及防护技术综述[J].信息安全学报,2018,3(1):48-67 [点击复制]
- WANG Yazhe,ZHANG Chengyi,HUO Dongdong,LI Jialin.A Survey of Security Threats and Defending Technologies on IoT Smart Devices[J].Journal of Cyber Security,2018,3(1):48-67 [点击复制]
|
|
本文已被:浏览 8474次 下载 12669次 |
码上扫一扫! |
IoT智能设备安全威胁及防护技术综述 |
王雅哲1,2,3, 张城毅1,2,3, 霍冬冬1,2, 李佳琳1,2,3
|
|
(1.中国科学院信息工程研究所 信息安全国家重点实验室, 北京 中国 100093;2.互联网智能设备信息安全北京市工程实验室, 北京 中国 100093;3.中国科学院大学 网络空间安全学院, 北京 中国 100049) |
|
摘要: |
伴随着物联网的产生和发展,IoT智能设备越来越多地出现,其大规模普及的同时,也给用户个人资产安全与隐私保护带来了极大地冲击和挑战。本文围绕智能设备,基于智能设备终端、云服务端和用户控制终端三端系统架构,综述目前智能设备安全威胁的主要来源和技术攻击手段,并针对性地梳理已有防护技术和安全研究现状。然后,针对现有IoT智能设备安全防护体系缺失和安全设计不足的问题,本文讨论提出了全生命周期的IoT智能设备系统防护模型设计思路。 |
关键词: 智能设备安全 安全威胁和防护综述 系统防护模型设计 |
DOI:10.19363/j.cnki.cn10-1380/tn.2018.01.004 |
投稿时间:2017-04-10修订日期:2017-05-18 |
基金项目:本课题得到中国科学院青年创新促进会(1105CX0105),信息安全国家标准项目(智能互联设备信息安全技术要求),国家重点研发计划(2017YFB0801900)资助。 |
|
A Survey of Security Threats and Defending Technologies on IoT Smart Devices |
WANG Yazhe1,2,3, ZHANG Chengyi1,2,3, HUO Dongdong1,2, LI Jialin1,2,3
|
(1.State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;2.Engineering Laboratory of the Internet Smart Device Information Security, Beijing 100093, China;3.School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China) |
Abstract: |
With the emergence and development of Internet of things, IoT smart devices increasingly appear and its large-scale popularity also has brought great impact and challenges on the user's personal assets security and privacy protection. In this paper, based on the smart device terminal, cloud server and user control terminal this three-terminal system architecture, we first summarize the main sources and technical attack methods of smart device security threats and combs the corresponding protection technologies and security research. Then, aiming at the problem of the lack of security protection system and the lack of security design on the existing IoT smart devices, this paper discusses and puts forward full life-cycle IoT smart device protection system model designing. |
Key words: Smart device security summary of threat and protection protection system model designing |