...
首页> 外文期刊>Internet of Things Journal, IEEE >General Theory of Security and a Study Case in Internet of Things
【24h】

General Theory of Security and a Study Case in Internet of Things

机译:一般安全理论与物联网研究案例

获取原文
获取原文并翻译 | 示例
           

摘要

This paper studies the problems of “security meridian-collateral” and “security confrontation” systematically and refreshes the traditional concept of security. On the one hand, based on the model of “meridians” in Chinese traditional medicine for the first time, this paper proves the following results strictly by the probability method. There is a complete “meridian-collateral diagram” in Internet of things and any finite system, so that any “sickness” of the system can be cured effectively. On the other hand, this paper studies the network attack and defense from the perspective of the information theory. Through mathematical modeling, based on the famous Shannon's coding theorem, the research on the ability problem of attacker and defender is transformed into the research on the channels of attacker and defender. From the perspective of the channel capacity in information theory for the first time, this paper gives the reachable theoretical limitation of the attack ability of hacker and the defend ability of honker precisely.
机译:本文系统地研究了“安全子午线抵押”和“安全对抗”问题,并刷新了传统的安全概念。一方面,本文首次基于中医“经络”模型,用概率法严格证明了以下结果。物联网和任何有限系统中都有完整的“子午线抵押图”,因此该系统的任何“疾病”都可以得到有效治愈。另一方面,本文从信息论的角度研究网络的攻击与防御。通过数学建模,以著名的香农编码定理为基础,将对攻击者和防御者的能力问题的研究转化为对攻击者和防御者的渠道的研究。本文首次从信息论中的渠道容量的角度,准确地给出了黑客的攻击能力和卖淫者的防御能力的可达理论极限。

著录项

  • 来源
    《Internet of Things Journal, IEEE》 |2017年第2期|592-600|共9页
  • 作者单位

    Information Security Center, State Key Laboratory of Networking and Switching Technology and the National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China;

    Information Security Center, State Key Laboratory of Networking and Switching Technology and the National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China;

    Information Security Center, State Key Laboratory of Networking and Switching Technology and the National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China;

    Information Security Center, State Key Laboratory of Networking and Switching Technology and the National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Internet of things; Computer hacking; Temperature measurement; Channel capacity;

    机译:物联网;计算机黑客;温度测量;通道容量;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号