何申, 黄静, 赵海燕, et al. Establishing secure boundary of IoT based on trusted computing[J]. 2019, 32(12): 7-11. DOI: 10.13992/j.cnki.tetas.2019.12.002.
基于可信计算构建物联网安全边界
摘要
近年来
中国物联网政策支持力度不断加大
技术创新成果接连涌现
各领域应用持续深化
产业规模保持快速增长。本文以物联网接入边界为切入点
探讨了物联网安全接入问题的解决方案。设计了基于可信计算3.0的物联网可信网关
以及安全管理中心
构建了可信的物联网安全边界接入系统
为各种异构物联网终端设备提供了安全屏障
隔绝了针对于物联网设备的网络安全威胁。
Abstract
Recent years
China’s IoT policy support has been increasing continuously
technological innovation achievements emerged one after another
applications in various fields expanded deeply
and the industrial scale maintained rapid growth. This paper takes the IoT boundary as the entry point and discusses the solution of the security problem of the IoT. A trusted IoT boundary access system was built by IoT gateway device in which trusted computing 3.0 and a security management center were included. It provides a security barrier for various heterogeneous IoT devices by isolating network threats.