Things are called Following computer, docmouldinget, the world's third wave of the information industry. In triumph, while things behind the security crisis is increasingly apparent. With protocol /IP networks, the network is also facing things manageable, controllable and quality of service and a series of problems, and worse. If these problems can not be satisfactorily resolved, or that there is no good solution, further development will be largely restricted Things. Because the network is a security risk, not to mention the distribution of random sensor networks, ubiquitous wireless networks, but also provides a variety of network attacks a broad soil, more severe safety problems, if not handled properly, the whole country economic and security will be threatened.
Things is protocol /IP network continuation and expansion of the client network extension and expansion to between any things and things, is a new form of information transmission and exchange, networking era, also known as post-IP era. At present, the academic community recognized & ldquo; Things is a large-scale information systems by the perception layer, network layer and application layer of & rdquo ;, together constitute the core structure includes: perception layer, such as smart cards, RFID tags, sensor networks, etc. Its main role is to collect all kinds of information; the network layer, computers such as triple play, docmouldinget, wireless network, fixed network, with its main role is to be responsible for information exchange and communication; the application layer, is responsible for analysis and processing of information, control decisions in order to achieve intelligent customized applications and services, and ultimately to achieve things and objects, and objects are linked to construct a covering everything in the world of & ldquo; docmouldingetofanorecticgs & rdquo ;.
Things perception layer key technologies include RFID technology, infrared sensors, global positioning systems, laser scanners, sensor network technology, which is the base technology of intelligent information sensing devices. Network and management of key technologies including cloud computing, 4G technology, SOA and so on. Digital signal placed on the animals, plants, machinery and electronic goods produced smart media transmit information anytime, anywhere via a wireless network, the use of cloud computing technology, the real-time dynamic management of hundreds of millions of all kinds of items as possible. From the architecture of things, the things is reflected in the integration, regardless of its infrastructure is the use of wireless sensor networks or what else the network infrastructure.
The real value of things that network, rather than substance. Because in that network, so complicated. Currently perception layer networking technology is relatively mature, in all walks of life have been more successful application, but if the perception of information is not a huge network system management and integration of them, there would be no in-depth application, such networks it does not make sense. To build such a complex system called the network platform to achieve integrated management of the business, the integration of information extraction and categories, there is data transmission and interactive guidance, etc., its complexity and difficult nature can be desired with knowledge of.
Things threats
What are the important things security threats? And traditional Internet security threats facing what is the difference? To discuss this issue, we have to perceive layer sensor networks, RFID example expanded.
Secondly, when things perception layer mainly uses RFID technology, embedded objects can not only be easily perceived by the article master RFID chip, while others can be perceived. Especially when this is perceived information transmitted over the wireless network platform, security of information is quite fragile. How perception, transmission, application process provide a strong security system Watson Instrumentation for security, is a problem.
Things Online believe in the premise of taking foreign invasion, the need for sensor network data, in-depth data mining analysis to identify statistical regularity from the data. Through the establishment of various mathematical models of sensor network data extraction, mining the rules and integration, reasoning, induction, etc., made objectively and comprehensively to the normal operation of large-scale sensor networks do situation assessment indicators for sensor networks Measures to provide safe operation of alarm.
In short, things of all segments of the security must draw attention.
From the architecture of things, the things in addition to the face of the traditional protocol /IP networks, wireless networks and mobile communication networks and other traditional network security issues, there are also a large number of their own specific safety problems, and these particularities, mostly from perception layer. We believe that the Internet of Things perception layer facing the main threats are the following:
Similarly, in the things of the transport layer and application layer there are also a number of security risks, urgently appears corresponding, efficient security strategies and technologies. But in these two layers can learn protocol /IP network prior art where some more, and traditional network against cross each other.
1. Security Privacy
When radio frequency identification technology is used for networking systems, RFID tags are embedded in any item, such as people's daily necessities, and supplies the owner may not be able to detect, causing supplies of owner uncontrolled be scanned , positioning and tracking, which involves not only technical issues, but also related to legal issues.
2. IntelliSense node of its own security problems
Things That machine /sense node local security issues. Due to the application of things can replace people to complete some complex, dangerous and mechanical work, so things machine /sensor nodes deployed in unattended most scenes. Then the attacker can have easy access to these devices, thereby causing damage to them, or even replace the machine's hardware and software through the local operation.
3. counterfeit attack
Because intelligent sensor terminals, RFID electronic tag relative to the traditional protocol /IP network is & ldquo; naked & rdquo; in the attacker's eyes, plus delivery platform is within a certain range & ldquo; exposure & rdquo; in the air , & ldquo; crosstalk & rdquo; in the field of sensor networks is very frequent and easy. Therefore, the sensor network spoofing attacks is an active form of attack, it is a great threat to the work sensor nodes.
4. Data-driven attack
Data-driven attack is a program or application to send data to produce unintended consequences of the attack, typically provides access to the target system privileges for the attacker. Data-driven attacks into buffer overflow attacks, format string attacks, input validation attacks, simultaneous exploits, trust vulnerability attacks. Typically implemented buffer overflow attacks to sink node sensor network is very easy.
5. malicious code attacks
There are an infinite number of malicious programs entrance in a wireless network environment and sensor network environment. Once the invasion success, then spread through the network becomes very easy. In terms of its spread, concealment, and so destructive compared to protocol /IP networks more difficult to prevent, such as malicious code like worms, parasitic file itself does not need to detect and remove this malicious in such an environment the code will be difficult.
6. Denial of Service
Most of these attacks occur in the convergence of sensing layer security network at the core.
First, sensor network is a serious environmental uncertainties exist. Sensing intelligent node on the widespread nature is a variety of devices to monitor and control the network, they monitor different aspects of the network, it offers a variety of event data in different formats to characterize the current state of the network system. However, these intelligent sensor nodes is the best place for an alien invasion. From this perspective, things are very complex data-aware layer, there are frequent data between conflict and cooperation, with strong redundancy and complementarity, and the massive amounts of data. It has a strong real-time features, but it is also multi-source heterogeneous data. Thus, with respect to the traditional protocol /IP network technology, all network monitoring measures, defense technology is not only faced with a more complex structure of the network data, and also a higher real-time requirements, network technology, network security and other related in front of disciplines will be a new subject, a new challenge.
Due to the large number of nodes of things, and in the presence of the cluster approach, so when the data transmission, data transmission needs of a large number of nodes will cause network congestion, resulting in denial of service attacks.
7. Things operational security issues
Because things node unattended, and there may be dynamic, so how networking equipment remotely configure subscription information and service information will become a problem. In addition, the security architecture of the existing communication network communication needs are between people from starting, not necessarily suitable to machine to machine communications between the demand was linked network. Using the existing network security mechanism will split Things logical relationship between machines.
8. Information Security
Sensor nodes usually features a single, limited energy, so they do not have sophisticated security capabilities, and a variety of network nodes perception layer, the collected data, the transmission of information and messages are no specific standards, so I can not provide unified security system. 9. The transport layer and application layer security risks
In the transport layer and application layer things together network security problems facing all existing protocol /IP networks, but also because of things in perception layer diverse data formats collected data from a wide variety of sensor nodes is massive and it is a multi-source heterogeneous data, network security issues will bring even more complex.
Security war started
Since the state and local governments to promote, currently things are accelerating the development of the security requirements of increasingly urgent things. Rationalize the architecture of things, clear things special security requirements, consider how to use existing mechanisms and technical means to solve the face of things temporary security issues, is the top priority.
Because things must be compatible and inherit the existing protocol /IP networks, wireless mobile networks, so existing network security system in most of the mechanism can still be applied to things, and be able to provide some security, such as authentication mechanisms, encryption mechanism. But also we need to IOT features of security mechanisms to adjust and supplement.
It is believed that safety issues are also things go & ldquo; divide and rule Layered & rdquo ;, the road. Traditional protocol /IP network for the network in different layers have the appropriate security measures and a corresponding method, this more complete approach, not in toto to the realm of things, but to be adjusted according to the architecture and particularity of things. Things perception layer, the perception layer and backbone network interface part of the following security defense technology mainly depends on the traditional information security knowledge.
1. Things encryption mechanism
Cryptography is the basis for information security. In a traditional IP network encryption applications usually takes two forms: point to point encryption and end to end encryption. We recognized from the current academic infrastructure point of view of things, whether it is little bit end to end encryption or encryption, to achieve them have difficulty, because in the perception layer node to run an encryption /decryption program requires not only storage overhead, high-speed imopeningantcontesdiscolourtrememberivegrade, but also the energy consumption of the node. Therefore, it is possible to achieve things in principle encryption mechanism, but difficult to implement the technology. 2. The node authentication mechanism
Authentication mechanism refers to the data communication receiver data can confirm the true identity of the sender, and whether the data during transmission has been tampered with. From an architectural point of view of things, perception layer of authentication mechanisms is necessary. Authentication is to ensure that identity information node encryption mechanisms by encoding data to ensure data confidentiality, to prevent data from being stolen during transmission.
PKI is public key theory and technology established to provide information security services infrastructure, is the technical foundation to solve the authenticity, integrity, confidentiality and non-repudiation of the information in this series of questions, the information security environment at Things The important program.
3. Access control technology
Access control in the IOT environment has been given a new meaning, from protocol /IP network, mainly to the & ldquo; people & rdquo; access authorization, became licensed to machine access, restricted distribution, interactive sharing of data, between machines will become more complex and machines.
4. Situation Analysis and other
Things of & ldquo; net & rdquo;
Network situational awareness and assessment techniques is to network operational status of the current and future period of time for quantitative and qualitative evaluation of real-time monitoring and an early warning of new network security monitoring technology. Things situational awareness and evaluation of the theory and technology is a field of study being undertaken.
Depth study of scientific problems in this area, from the theoretical to the practical sense, are very worth the wait, as compared with the traditional protocol /IP networks, sensor networks in the field of situational perception and evaluation has been given a new research content, not only only a single aspect of the problem of network security, but also to their problems sensor network architecture, such as the energy storage problem smart sensor node, the node layout during transmission delays, data traffic aggregation nodes and other issues. These factors for the normal operation of the network itself sensor networks are fatal. Therefore, situational awareness and evaluation in the field of sensor networks has gone beyond the simple IP network, network security significance, has been extended from the network security monitoring network to normal operation; in addition, sensor network structure more complex, network data Multi-source heterogeneous network data are highly complementary and redundancy, with strong real-time.