A new round of technological revolution in the world since 1998: the Internet of Things, a network technology that interconnects devices around the world through technologies such as RFID and intelligent computing, has attracted the full attention and participation of governments and global enterprises from all countries: the United States in the world , Japan and the European Union have successively proposed national strategies such as "smart earth" and ITU / ISO to vigorously carry out research on Internet of Things standards and trends; in China, the central government and provincial and municipal governments have taken the "sense of China" as the guideline to give great efforts to the development of domestic Internet of Things With policy tilts and capital investment, enterprises and academia have taken full action. The Internet of Things Industrial Park and the Internet of Things Standards Working Group have sprung up at the historic moment; the era of the Internet of Things has come.

In the autumn of 2011, the OWASP 2011 Yazhou Summit was successfully held in Beijing. Encryption, RFID and other Internet of Things related technologies have naturally become hot topics of discussion among the guests. The on-site demonstration of RFID information cracking is even more shocking. Its low cost and high speed , Multi-link cracking techniques, people have to return to the reality of huge security loopholes from the joy brought to the people by the Internet of Things, in this big network that connects things together, are we safe? We have sound Means to ensure the safety of this network? If it is not safe, what effect will it have? The American blockbuster "Eagle Eye" once described such a scene: a hacker entered the power network through the network and chased and driven the Mercedes-Benz car by controlling the high-voltage circuit fuse The object of hunting; although this scene has artistic exaggeration, it also reflects the terrible consequences that the Internet of Things may have after penetrating into the national economy and people's livelihood!

This article takes the IoT mobile sensing network-RFID as the object, analyzes and discusses the security issues involved from non-technical and technical levels, in order to benefit the healthy development of the Internet of Things.

1. RFID and Internet of Things from the perspective of economy and regulations

RFID is one of the main technologies of the Internet of Things perception network. Its tangible products are widely used in various application places: public security, power, medical, city, transportation, supply chain, banking, environmental protection, etc. Unattended and unattended are the norm. Due to the imperfection of relevant regulations, especially the general indifference of legal consciousness, the Internet of Things perception network has been illegally disassembled, illegally read, and illegally replaced. Such illegal behaviors are due to the particularity of the Internet of Things perception network. The consequences and impact will also be far greater than the destruction of non-Internet of Things perception networks, which deserves higher legal attention.

Today and tomorrow, where the Internet of Things is widely used, in the context of economic internationalization and the Internet without borders, RFID due to its quantum-level growth rate and number, its wide application has led to the generation of huge technical standard patent fees, business management information Incidents such as leaks involving national economic security are more likely to occur. Only through the maturity, improvement and application of national own standards can the economic security issues brought by the application of the Internet of Things be effectively solved.

From a non-technical point of view, the security of RFID and the entire Internet of Things are inseparable from strong legal guarantees, as well as the perfect and mature Chinese RFID technology standard system. China has started in these two aspects around 1999 The exploration and efforts are still in the initial stage, and there is still a big gap from the international standard. From this special perspective (imperfect regulations affect the security of RFID systems, and whether the security of RFID systems directly affects the security of the national economy), fortunately, the Internet of Things is still far from us.

Second, from the technical standards to see RFID and Internet of Things

The RFID standard is composed of three parts: air interface protocol, coding system and application system architecture.

a) Transmission and coding security risks

In the Internet of Things, the RFID system realizes the perception of terminal information. It itself recognizes a specific target through radio signals and reads and writes related data without the need to establish mechanical or optical contact between the identification system and the specific target. This feature makes it exposed to Radio signals in public places are easily stolen and more likely to be interfered. The resulting theft, cracking, and malicious modification are a major security issue for the entire Internet of Things.

b) Hidden dangers of application system security

The RFID standard is composed of three parts: air interface protocol, coding system, and application system architecture. The application system architecture involves RFID network applications. The RFID reading and writing device sends the read information to the Internet through a network-like DNS resolution service. On the server, because of the uniqueness of the code, the items with RFID tags can be found on the network after the code is parsed, just as people look at websites with known domain names on the Internet.

Therefore, similar to people's concerns about the information security of the Internet DNS, the Internet of Things also has the problem of who will master the resolution service. Anyone who has the right to analyze can grasp the content, location and logistics information of all items in the network. Once the analysis service in a certain area is interrupted, the consequences are far from simple as "no Internet access"

c) Data security risks

With the widespread application of RFID technology, various types of Internet of Things systems have also developed vigorously. Massive process data in units of T or P, and the final data are diverse in databases / files, mobile data / non-mobile data / and other structures / non-structures. The forms exist in the Internet of Things system. They are the key to the normal and correct operation of all systems. Because of this, ensuring that various types of data are not maliciously viewed, modified, or destroyed has become the focus of Internet of Things security.

The China Internet of Things Standards Organization, which began in 2005, has formulated Chinese technical standards for the technical architecture of RFID itself, which has solved the security problems in transmission, coding, and application systems to a certain extent. It is gratifying. However, as the security problems of RFID are alleviated, the security center of the entire Internet of Things system will move to negligible data security, and only when this field is strengthened, RFID, including the Internet of Things as a whole, will be completely safe. At present, in this field, national consciousness is in the obscure stage, technology research and development is in the initial stage, and project construction is in the leading stage. The development of Chinese standards is far behind the rapid development of the Internet of Things, which affects the security of the Internet of Things. There is no way to fully guarantee the security application of RFID. From the perspective of RFID security, even if the security of RFID itself is improved, because of the core threats such as data security, there is still a huge gap between the Internet of Things and us. From this perspective, it is fortunate that the Internet of Things is away from us It's still far away.

Recessed Tabletop Socket

Flush Mount Socket,Recessed Tabletop Socket,Concealed Mounting Socket,Recessed Mounted Power Strip

Dongguan baiyou electronic co.,ltd , https://www.dgbaiyou.com