网站大量收购闲置独家精品文档,联系QQ:2885784924

物联网应用安全研究.doc

  1. 1、本文档共25页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
物联网应用安全研究Research on application security of Internet of things abstract The Internet of things is known as the third revolution of the world information industry after the computer and the internet. With the advent of the Internet of things, information security issues. Users expect their own information security monitoring and early warning system, which requires the support of the corresponding security services and software, and train a group of professionals to carry out related work, which requires a huge investment. On the other hand, more and more types of security products, product suppliers standards are different, the user is also facing difficulties in the selection of safety products. In such an environment, it is very important to provide the security architecture of application layer. According to the product standard is not unified, user security responsibility, resource consumption and other network security situation, proposed the establishment of a unified security service platform, the concept of providing security services for different users, from the enterprise user security, application of the Internet of things is no longer isolated state for different users of network security convenient and quick service. On the basis of this assumption, this paper makes a deep research and summary of the current popular service oriented architecture, XML technology, middleware technology and Web services, and provides technical support for the realization of this idea. Based on the analysis of security requirements, proposed centralized monitoring and unified management and comprehensive analysis, put forward the security service system structure, the concept of rapid response, it analysis for data acquisition, data processing, data security monitoring, four layer structure. This structure has the following characteristics: low consumption of resources, security requirements of customized service, save maintenance software and professional training inves

您可能关注的文档

文档评论(0)

185****7617 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档