首页出版说明中文期刊中文图书环宇英文官网付款页面

物联网安全挑战:云和区块链、后量子、密码学和进化 技术

帕沃 尔·, 彼得 ·普
索瓦克电气工程与信息技术学院

摘要


物联网连接物理世界和控制论世界。 因此,物联网设备的安全问题尤其具有破坏性,需要加以解决。 在本
论文中,我们从未来威胁的角度概述了物联网当前的安全问题。 我们确定了需要特别解决的三个主要趋势:物联网
与云和区块链集成的安全问题,量子计算导致密码学的快速变化,以及人工智能的兴起和安全范围内的演化方法。
关于物联网,我们概述了已识别的威胁,并提出了未来保护物联网的解决方案。

关键词


物联网 ; 云 ; 区块链; 后量子; 进化 ; 人工智能

全文:

PDF


参考


[1] Iakovidis, Towards Personal Health Record:

Current Situation, Obstacles and Trends in Inplementation

of Electronic Healthcare Records in Europe, International

Journal of Medical Informatics, 1998;52(1):105-115.

[2] E. Villalba, M.T. Arredondo, S. Guillen and E. HoyoBarbolla, A New Solution for A Heart Failure Monitoring

System based on Wearable and Information Technologies, In

International Workshop on Wearable and Implantable Body

Sensor Networks 2006-BSN 2006.

[3] J. Zhou, X. Lin, X. Dong and Z. Cao, PSMPA:

Patient Self-controllable and Multi-level Privacy-preserving

Cooperative Authentication in Distributed m-Healthcare

Cloud Computing System, IEEE Transactions on Parallel and

Distributed Systems, to appear.

[4] M. Li, S. Yu, K. Ren and W. Lou, Securing Personal

Health Records in Cloud Computing: Patient-centric and

Fine-grained Data Access Control in Multi-owner Settings,

SecureComm 2010, LNICST 2010;50:89-106.

[5] S. Yu, K. Ren and W. Lou, FDAC: Toward Finegrained Distributed Data Access Control in Wireless Sensor

Networks, In IEEE Infocom 2009.

[6] F.W. Dillema and S. Lupetti, Rendezvous-based

Access Control for Medical Records in the Pre-hospital

Environment, In HealthNet 2007.

[7] J. Zhou, Z. Cao, X. Dong, X. Lin and A. V. Vasilakos,

Securing mHealthcare Social Networks: Challenges,

Countermeasures and Future Directions, IEEE Wireless

Communications, 2013;20(4):12-21.

[8] J. Sun, X. Zhu, C. Zhang and Y. Fang, HCPP:

Cryptography Based Secure EHR System for Patient Privacy

and Emergency Healthcare, ICDCS 2011.

[9] Z. Liu, Z. Cao, Q. Huang, D.S. Wong and T.H. Yuen,

Fully Secure Multiauthority Ciphertext-policy Attributebased Encryption without Random Oracles, ESORICS

2011;278-297.

[10] A. Sahai, H. Seyalioglu and B. Waters, Dynamic

Credentials and Ciphertext Delegation for Attribute-Based

Encryption, CRYPTO 2012;199-217.

[11] X. Lin, R. Lu, X. Shen, Y. Nemoto and N. Kato,

SAGE: A Strong Privacy-preserving Scheme against Global

Eavesdropping for E-health Systems, IEEE Journal on

Selected Areas in Communications, 2009;27(4):365-378.




DOI: http://dx.doi.org/10.12361/2661-3727-04-05-112943

Refbacks

  • 当前没有refback。