摘要
随着物联网快速发展,海量设备接入网络。边缘计算虽提升了数据处理效率,却也带来新的安全挑战。传统安全架构已无法满足物联网设备的复杂需求,零信任安全理念 “从不信任,始终验证” 为其提供了新方向。本文聚焦边缘计算下物联网设备的身份伪造、数据泄露、网络攻击等问题,通过构建包含身份认证、访问控制、数据加密与安全监测的零信任安全架构,增强设备安全性与稳定性,降低安全风险。
关键词: 边缘计算;物联网设备;零信任;安全架构;身份认证
Abstract
With the rapid development of the Internet of Things (IoT), a vast number of devices are now connected to networks. While edge computing has enhanced data processing efficiency, it also introduces new security challenges. Traditional security architectures can no longer meet the complex requirements of IoT devices, and the zero trust security concept, which emphasizes 'never trust, always verify,' offers a new direction. This paper focuses on issues such as identity forgery, data leakage, and network attacks in IoT devices under edge computing. By constructing a zero trust security architecture that includes identity authentication, access control, data encryption, and security monitoring, this paper aims to enhance device security and stability and reduce security risks.
Key words: Edge computing; IoT devices; Zero trust; Security architecture; Identity authentication
参考文献 References
[1] 童盛富,姜成,王磊.大型体育赛事信息系统云网端协同的网络安全架构设计实践[J].网络安全技术与应用,2025, (04): 134-138.
[2] 罗思源,何蓉,拉巴多吉.物联网设备安全防护技术研究[J].网络安全技术与应用,2023,(12):24-26.
[3] 陈念标,杨亮,唐立明,等.企业零信任网络安全架构的应用实践研究[J].中国宽带,2023,19(09):157-159.
[4] 詹文华,魏盛春.新形势下特种设备安全监察模式探讨[J].中国电梯,2022,33(20):42-45.
[5] 宋阳.基于零信任的高速公路网络安全架构[J].长江信息通信,2022,35(10):218-220.
[6] 李同寒,张辉,樊林畅,等.基于TL-BLP模型的零信任安全架构研究[J].网络安全技术与应用,2022,(06):17-20.
[7] 李剑,张辉,戎国庆,等.5G边缘计算端到端安全防护分析[J].广西通信技术,2022,(01):41-44.
[8] 粟栗,庄小君,杜海涛,等.6G网络内生安全架构研究[J].中国科学:信息科学,2022,52(02):205-216.