首页--工业技术论文--无线电电子学、电信技术论文--通信论文--通信网论文--一般性问题论文--网络安全论文

物联网安全及其风险评估

Abstract第4页
摘要第5-8页
1 Introduction第8-22页
    1.1 Overview of The Internet of Things第8-16页
        1.1.1 Definition of the Internet of Things第8-10页
        1.1.2 Evolution of the IOT第10-11页
        1.1.3 Main characteristics of the IOT第11-12页
        1.1.4 Technologies used in the IOT第12-14页
        1.1.5 Architecture of the IOT第14-15页
        1.1.6 Main application fields of the IOT第15-16页
    1.2 Research Situation And Related Work第16-19页
        1.2.1 Research situation of the IOT and its security第17-18页
        1.2.2 Related work第18-19页
    1.3 Main Achievements and Organization of the Dissertation第19-22页
        1.3.1 Achievements of this Dissertation第19-20页
        1.3.2 Structure of the Dissertation第20-22页
2 Security Threats and Measures of the IOT第22-42页
    2.1 Security Characteristics of the IOT第22-30页
        2.1.1 Security requirements of the IOT第22-24页
        2.1.2 Possible attacks on the IOT第24-26页
        2.1.3 Security technologies of the IOT第26-29页
        2.1.4 Conclusion第29-30页
    2.2 Security Architecture of the IOT第30-32页
        2.2.1 A security oriented IOT architecture第30-31页
        2.2.2 Security architecture of the IOT第31-32页
    2.3 Security Threats to the IOT第32-37页
        2.3.1 Security threats in sensation layer第32-34页
        2.3.2 Security threats in network layer第34-36页
        2.3.3 Security threats in application layer第36-37页
        2.3.4 Security threats in control and management of the IOT第37页
    2.4 Security Measures for the IOT第37-40页
        2.4.1 Security measures in sensation layer第37-39页
        2.4.2 Security measures in network layer第39-40页
        2.4.3 Security measures in application layer第40页
    2.5 Conclusion第40-42页
3 Risk Assessment Methods of Information System Security第42-50页
    3.1 Common Risk Assessment Methods第42-46页
        3.1.1 Consultative, Objective and Bi-functional Risk Analysis (COBRA)第42-43页
        3.1.2 Conducting Security Risk Analysis (CORAS)第43-44页
        3.1.3 Central Communication and Telecommunication Agency (CRAMM)第44-45页
        3.1.4 Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE)第45页
        3.1.5 Security Oiffcers Management and Analysis Project (SOMAP)第45-46页
    3.2 Comparison of Common Risk Assessment Methods第46-48页
        3.2.1 Advantages and disadvantages of each risk assessment method第46-48页
        3.2.2 Comparison of the risk assessment methods第48页
    3.3 Conclusion第48-50页
4 Risk Assessment of the I0T Security第50-60页
    4.1 Calculating the risk-factor weights第50-57页
        4.1.1 Constructing the structure of recursion order hierarchy第50-52页
        4.1.2 Calculation of relative weight of the second layer第52-53页
        4.1.3 Calculation of relative weight of the third layer第53-55页
        4.1.4 Case study第55-57页
    4.2 Computation of the risk degree of the IOT by means of entropy第57-59页
        4.2.1 Determining the entropy coeiffcient for each risk factor of the IOT第57-58页
        4.2.2 Case study第58-59页
        4.2.3 Computing the synthetic risk degree of the IOT第59页
    4.3 Conclusion第59-60页
5 Conclusions第60-62页
References第62-66页
Acknowledgements第66-68页
Research Achievements List第68页

论文共68页,点击 下载论文
上一篇:基于蚁群算法的测试用例选择机制研究
下一篇:无线网络室内定位算法研究