Research on Information Protection of IOT Layers

The concept of "Internet of Things" was first proposed in 1999. At present, there are many descriptions of the Internet of Things, but the content is basically the same. The Internet of Things is based on the computer Internet, through a variety of information-sensing devices such as RFID, GPS, laser scanners and other information-sensing devices. According to the agreed protocols and constraints, the relevant equipment and articles are connected to the Internet for information exchange and communication to realize intelligent identification, positioning, tracking, monitoring and management of a network.

The Internet of Things can be divided into three layers: the perception layer, the network layer, and the application layer. As shown in Figure 1. The sensing layer implements monitoring of object identification and awareness, the network layer implements data processing and transmission, and the application layer implements storage, excavation, processing, and application of information sent by the network layer. The task of the sensory layer is the original information collector. The sensor and equipment operation environment is the terminal link that is easily controlled and destroyed. It is also the most direct link to the application of the Internet of Things. The environmental security control of this link is particularly important for the Internet of Things.

1 Information security of the Internet of Things's sensory layer

In the traditional network, the security of the network layer and the security of the service layer are independent of each other. The special security problem of the Internet of Things is caused by the fact that the Internet of Things (IoT) integrates the perception network and the application platform based on the existing mobile network. Most of the mechanisms in the mobile network can still be applied to the Internet of Things and can provide certain security, such as authentication mechanisms, encryption mechanisms, etc., but the security mechanism needs to be adjusted and supplemented according to the characteristics of the Internet of Things. This makes the Internet of things in addition to the traditional network security issues facing the mobile communication network, there are still some special security issues that are different from the existing mobile network security.

Typical devices of the Internet of Things's sensory layer include RFID devices, various types of sensors (such as infrared, ultrasound, temperature, humidity, speed, etc.), image capture devices (cameras), global positioning systems (GPS), and laser scanners. When the Internet of Things collects data at the sensing layer, its information transmission method is basically wireless network transmission. If there is no effective protection measure for such signals exposed in public places, it is easy to be illegally intercepted, stolen, and interfered; and in the Internet of Things In the application, a large number of sensors are used to mark the items and equipments are controlled remotely by people or computers to complete some complex, dangerous or high-precision operations. In this case, most of these items in the Internet of Things are deployed in unmanned areas. If the monitored location completes the mission, then the attacker will have relatively easy access to these devices so that these devices or the sensors they carry can be destroyed or even illegally manipulated by deciphering the sensor communication protocol.

Perceptual information should pass through one or more sensor nodes connected to the external network, which are called gateways (sinks or gateways). All communication with internal nodes of the sensor network needs to communicate with the outside world through gateway nodes. Therefore, the information security problems that the perceptual layer may encounter mainly include the following aspects:

1) The existing Internet has relatively complete security protection capabilities, but due to the large number of nodes in the Internet, it will easily lead to large amounts of data being sent at the same time, making the sensor network nodes (ordinary nodes or gateway nodes) subject to Denial of service (DOS) attacks on the Internet;

2) The gateway node of the sensor network is controlled by the adversary - all security is lost;

3) The common node of the sensor network is captured by the adversary, which provides the possibility for the intruder to launch an attack on the Internet of Things.

4) Identification, identification, authentication, and control of a large number of sensor nodes connected to the Internet of Things.

2 The information security protection at the perception layer of the Internet of Things is based on the characteristics of the Internet of Things and the above-mentioned problems in the security of the Internet of Things awareness layer. It is necessary to take effective protection measures. The following are the main points:

2.1 Strengthen the security control of sensor network confidentiality

Within the sensor network, an effective key management mechanism is needed to ensure the security of the communication within the sensor network. Confidentiality requires establishing a temporary session key during the communication to ensure data security. For example, in the selection of a radio frequency identification system in the construction of the Internet of Things, whether to select a system having a password and an authentication function should be considered based on actual needs.

2.2 Strengthen Node Authentication
Individual sensor networks (especially when sensor data is shared) require node authentication to ensure that the illegal node cannot access. Authentication can be solved by symmetric cryptography or asymmetric cryptography schemes. An authentication scheme using a symmetric cipher requires a preset shared key between nodes, which is relatively high in efficiency and consumes a small amount of network node resources. Many sensor networks use this scheme, and a sensor network using asymmetric cryptography is used. Generally have better computing and communication capabilities, and higher security requirements. Performing key agreement based on authentication is a necessary step to establish a session key.

2.3 Strengthening Intrusion Monitoring

Some important sensor networks need to evaluate the behavior of nodes that may be controlled by the adversary in order to reduce the risk of enemy intrusion. On sensitive occasions, the node must set up a blockade or self-destruction program, find that the node leaves the specific application and place, start blocking or self-destruction, so that the attacker can not complete the analysis of the node.

2.4 To strengthen the secure routing control of the sensor network

Almost all sensor networks require different secure routing technologies. The cryptographic technologies involved in the security requirements of sensor networks include lightweight cryptographic algorithms, lightweight cryptographic protocols, and cryptographic techniques that can set security levels.

2.5 should build and improve China's information security regulatory system

At present, there is a lack of centralization of the law enforcement authorities in the regulatory system, multiple multi-headed management, no differences in the management requirements for information networks with different degrees of importance, no standards, and lack of targeted issues, and there is no way to control and control the units and information systems that should be protected. Since the security of sensor networks generally does not involve the security of other networks, it is a relatively independent issue. Some existing security solutions are also applicable to the Internet of Things. However, since the sensor network in the Internet of Things environment suffers increased opportunities for external attacks, traditional security solutions for independent sensor networks need to be upgraded before they can be used, that is, higher in security requirements.

3 Conclusion

The Internet of Things awareness layer is the foundation of the Internet of Things. There are many technology-related security issues in the sensor layer. Before implementing and deploying the Internet of Things awareness layer, security assessment and risk analysis should be performed according to the actual situation. The security level should be determined according to the actual needs to implement the solution so that the Internet of Things can be developed and applied. During the process, its safety protection measures can be continuously improved.

references:

[1] Zang Jinsong. Security Analysis of Internet of Things [J]. Computer Security, 2010, 6.

[2]LIU Zhi,HOU Yi. Research on Information Security Protection in the Era of Internet of Things[J].Microcomputer Applications,2011,32(1).

[3] Ye Qing. Technical Analysis of Internet of Things Security Problem [J]. Network Security Technology and Application, 2010,10.

[4]You Zhanqing, Liu Kesheng. Radio Frequency Identification (RFID) and Barcode Technology [M]. Beijing: Mechanical Industry Press, 2007.

[5] Wu Chuankun. The Security Architecture of Internet of Things [J]. Strategy and Decision Research, 2010, 25(4).

Filter Basket
Product Material: Stainless Steel Wire Mesh with 304.316.316L, wire cloth, Copper screen,Nickel screen, galvanized square mesh, black wire cloth, dutch wire mesh, filter mesh.
Feature: Acid and alkali resistance, high temperature resistance, abrasion resistance, not easy to damage, filter can be used repeatedly after cleaning.
Our main products including:
Dust removal filter Wire Mesh Basket, waterproof dust filter cartridges, solid-liquid separation filter cartridge, air filter cartridges, the light filter, water vapor liquid filter cartridges, Liquid medicine filter cartridges, Lubricating oil filter cartridges, Oil-water separation filter cartridges, Lampblack filter cartridges, etc.

Filter Basket

Filter Basket,Professional Filter Basket,Foldable Filter Basket,Stainless Steel Filter Basket

Anping County Comesh Filter Co., Ltd , http://www.comeshfilter.com

This entry was posted in on