Good morning, teachers and experts, just now, professors and experts have spoke very good reports. Some policies on the top of the Internet of Vehicles, including some developments in technology, and the direction of application are very good. I am mainly talking about RFID-based information security. analysis. It is because the Internet of Vehicles involves a lot of technology, and the front-end sensing technology is much more. I will mainly elaborate on this, because nowadays, various cities are promoting the Internet of Vehicles. At present, there are many research work, and the technology of RFID is used as a leading technology. So this information security has made an analysis and introduction here.

This article refers to the address: http://

It is divided into two parts, the first part is mainly introduced. The second part may be related to time. System analysis, safety analysis, and a general design. Application background, I am networking, this is not necessarily defined, that is to say, based on the meaning of RFID, the meaning of the Internet of Vehicles, some meanings to explain. So just now the teachers also said that the Internet of Vehicles is some application systems of the Internet of Things in vehicle management. Well, here, it mainly relies on the main information technology means such as RFID and video recognition to establish the identity information of the vehicle as the core and the reliable electronic phenomenon for life. And through various means of transmission, the electronic information of the vehicle is truly, reliably, completely and dynamically mapped to the digital platform of the application system. Then, through the monitoring service support of this electronic phenomenon of the running platform, the supervision service of the vehicle in the real scene is realized. That is to say, I use RFID, which is equivalent to a person's ID card. We use an electronic ID card now. Then, using RFID technology, it is quite a function of an electronic license plate and an electronic ID card. Then its core value is a networked resource application that senses vehicles and information, not an instrumental application. Then for the public security, traffic management, insurance and other industries, these management and services related to vehicle information provide such a deep development and comprehensive utilization. Then form a socialized model of sharing resources between various functional departments and connecting services. So effective to solve and realize automatic vehicle identification, then Professor Shi was very good at the time. The two professors spoke very well, a very important function, and the final function was zero traffic and zero congestion. So for the public security system, it is a very ideal such a goal. Then of course, if you use such a resource, then there are so many involved, some sharing of vehicle information. Then finally realize a lot of functions and services here. Automotive digital standard system, then here we talk about RFID technology system, based on such a combination of architecture, of course, not only RFID technology, but also multiple technology identification, image, video, GPS multiple sensing means, then through the network, cloud computing massive terminal Some technologies such as monitoring, security, etc., form a reliable technical guarantee, and then establish such a public service platform for information. Then, with the car as the node, based on the network, people, cars, roads, and networks develop a network such as car networking, and finally form a platform for such information resources.

This is a system of its technology. Based on wireless radio frequency RFID technology, the vehicle can be reliably identified, real-time reliable, anti-interference, and eliminate the existence of fake cards and deck cars. Then for the management of public security, special vehicle management, vehicle insurance, etc. There are also intelligent video technologies, massive terminal monitoring, sensors, and other sensor technologies. Then there is a very important thing here, that is, security technology. As a resource, as a resource. Then the information on this side involves a variety of important information, including, for example, vehicle information, electronic wallet payment, then the information is safely planned, and can not be leaked casually. I don’t have much to say about this RFID technology. At present, we are promoting the use of vehicles in various cities. It is also based on the trend of our policies. It is said that the white papers and the resources planned by the Ministry of Industry and Information Technology are 800 megabytes and 900 megabytes. According to this special application of the vehicle, it is anti-jamming, then we use such an electronic tag for the missing machine type equipment. Then of course it has a global unique ID number, the requirement is a tamper line. At the same time, it is required to carry out reliable identification under 120 km. Then it has these advantages. Then this is to say that it is also a relatively unified communication window in foreign countries. That is to say, when we are currently applying, the electronic tag is installed in a communication window behind the mirror, because because of the current many vehicles, it has the front windshield when the vehicle leaves the factory, already contains metal ion block. Wind glass. If there is no such communication window, for our RFID, it is also a short-range wireless communication, and its reliability identification cannot be realized. So a memory of such a tag, we have to carry out a resource information application, then we have to plan some of its tag memory.

Now we are based on the planning of some 18000-6 systems, then this is the partition application of some resources we have carried out in various industries. Then this is to say that for the Internet of Vehicles to implement a framework of the entire system, then the perception layer, electronic license plate, as well as the road network environment and other signs. Then there is a public security network inside the network, as well as a carrier network, as well as wireless and wired services. For the public security and business, provide a variety of such services. Then the entire service system must be supported by some security measures. Then this is to say, I am talking about an analysis of the entire vehicle networking basic application system.

Let me talk about safety analysis and risk analysis. Well, here, I also speak at several levels. A security analysis of the perception layer, then the security analysis of the perception of the subject node, then here is the emphasis on RFID. Then the same is true for other sensors. Then there is an eavesdropping attack, such as an RFID tag, and an infinite broadcast between readers, stealing the content that you want to transmit, and eavesdropping directly to attack. Then at the same time spoofing attacks, storing attacks, and cloning attacks, then here, for example, the tag that the attacker wants to obtain, the data is sent to the reader, the reader will play back the record, and then read the transmission player, the reader will One content is written to another RFID. There are also some physical damage, tampering information, as well as RFID virus attacks, some leaks of private information, here I will not expand one by one.

For the perception node, there are many security hazards such as short-range communication such as tags and readers, such an analysis. There is also the analysis of perceived environmental security, because some of our many IoT nodes are placed in an unattended environment, there are some security risks here. For example, natural disasters, as well as power failures, theft, electromagnetic radiation, etc., have such risks. There is also an analysis of network security, then this is some of the traditional analysis. Denial of service attacks, period attacks, etc., packet capture by the network, by scanning software viruses and so on. There are some analysis of the operating system, because we are all through some terminal control, to install some, must be implemented through the operating system. Then every operating system will have loopholes and there are some hidden dangers. There are also applications, especially the Internet of Things in its application system is more complex and diverse, there is no specific security system that can solve all system security problems. Then there are some analysis of management security, such as the internal destruction of the network structure, including the administrator's user name and password, as well as some important information of the system to the outsiders, such information leakage and so on. . There are also some problems with the efficiency of system operation. After all, as a vehicle network, it is such a huge amount of data, so it involves such a problem of security and operational efficiency. Then it contains the network theme application, from the perception layer to the application layer, there are many links. Then the effect and efficiency, then the main goal of service management. Then it is also the purpose of safeguards to achieve the expected good results. So in terms of improving the effect, good results and the efficiency of an operation, then we must ensure that such a good relationship between the two.

Due to the system infrastructure, it becomes very complex and the business and data reliability requirements are very high. Then it shows that 60% more accidents in the system are related to human activities. Including some maintenance, program configuration of key systems, maintenance personnel affairs, etc., then solve the relationship between the two. This is a safe analysis from different levels.

In general, some ideas for design, then of course we design to pass some of the country's documents, laws and regulations listed, including some of the public security information security. The main design principles are comprehensive prevention, active defense, layer-by-layer prevention, demand risk, cost balance, dynamic development and scalability. The main design idea is that we divide the car network into an extension of the IP network and the IP network. Then the IP network part mainly carries the exchange of various vehicle data and the provision of some information of the service unit. Then the IP network part, we are related to the perception layer, that is to say, the security of the Internet of Things, mainly because it comes out more than the perception layer and the perception node. So it is not to say that the extension of the IP network network does not have an IP address. But it and the network may be different segments, so many companies are unattended on the front end, so these and our application can not be placed in the same segment. So more important is the extension, for example, designing a lot of smart cards, various sensors, then may not have an IP address. We call it the extension, so our entire security design considerations are also considered through these two levels. One is to consider most of the IP network, and the other part is to consider.

We must consider the design of the entire vehicle network, the application system, the network security, the system security, the security management, etc. Then each part must carry out detailed technical means to ensure its information security. So this is to say, we divide it into modules, such as the perception layer, where we protect objects such as tags, readers, cameras, sensors, and so on. Security must require confidentiality of information, secure transmission, and reliable transmission. Then the security protection layer here is based on the security layer here, we must carry out security measures. For example, encryption, here we mainly emphasize the FID communication, must pass some communication protocols, the air interface should be physically encrypted to ensure its security. For example, protection objects, a variety of acquisition base stations. Then the protective measures, system security monitoring, equipment security monitoring, virus security protection, border security protection, then the network layer, the main reason is that our security measures are encrypted by some IP channels, some encryption of the wireless channel. Then the application layer is involved more. The security of the main service platform, such as the provincial organization with certification authority, the authentication system such as secure access to SSL, and the service environment, also include security measures. We divide these entire security into patterns. Perception layer What kind of measures do we take to make it safe? For example, food monitoring, system monitoring, virus protection, border protection. The network layer also has an application layer, so through a number of different security measures, the entire system to ensure the security of the entire vehicle network. There is a deployment, which is the security sensitivity of each layer, such as our security group, data audit, path detection, and firewall reinforcement. Through the tunnel, it is communication. So at the front end, for the sake of chip security, then for the entire security center, we have a lot of systems, virus protection systems, authentication systems, trusted access platforms, PKI trusted support platforms, and so on. System to ensure the security of the entire network application. That is to say, the entire deployment, how each layer of each layer is like.

The second part of the security system, mainly introduces the security of the perceived source, because for the RFID, the other I simply passed. So I just talked about the perception node, this security hazard, attack, eavesdropping, tampering, and so on. So although in Chongqing and Guangzhou, cities have been promoting RFID applications. The current application is still a system of 18000, an open system. Then its security is far from meeting our requirements. Then I will consider chip security to design such a planned security chip with independent intellectual property rights, such as tag encoding, algorithm and storage content, and at the same time produce some standard systems with our own vehicles and applications. Then push RFID, in the application of vehicle management. At the same time, research has an independent intellectual property rights agreement, so that the technical performance of the car is enhanced and the safety of the vehicle is collected. At the same time, research on air interface protocols with independent intellectual property rights, so that the new technology of car-specific tags can be enhanced, the digitalization of automobiles, the collection, accuracy, reliability and security control of digital information. Then at the same time, chip encryption technology is required. Then such a technology for secure authentication between the tag and the reader ensures that the chip is so secure. It is from the front end that we have put an end to its tamper-proof possibilities.

At present, some of our three institutions, including many in China, are also advancing this work. So I was talking about it, one is the consideration of chip security design. The other is that the chip is a separate one. To be included in such a network system is a platform for trusted support. A platform for trusted support, then it includes two parts: the car network trusted access platform and the car network management platform. The trusted access platform is deployed in the car network data center, so that the smart card's source authentication digital signature and integrity verification are implemented. Then the management platform is mainly to provide services, the necessary distribution of cultural associations, and so on. That is to say, the chip and the entire network, the entire serious system, the encryption system are linked together. Then the trusted access platform, this function is to use a serious agreement between the sensing device and the base station data, and to sense the device serious agreement, the protocol is responsible for the identity authentication information of the sensing device, to make sure that the sensor is intact. Then at the same time between the sensor device and the processing center, establish a protocol for data signature and data integrity verification. At the same time, between the sensor and the data center, a secure transmission protocol is responsible for encrypting the information collected by the sensor. Then the security of this system, one is to say the security of the hardware system, the security of the operating system. Including software deployment, soft-dry interfaces, etc. Some security, these should be considered. This network transmission security, this is probably a browse, here is a way to secure the application through an encrypted tunnel. This is a division of a security domain, a division of security levels and security domains. Because the Internet of Vehicles involves a lot of functional departments, then the most important is a public security network and operators, some of the business services of the operators, and always become the carrier network. Because the public security network is in accordance with the provisions of national laws, its information can not be said that business casual interaction, then security measures must be guaranteed. This is a network anti-intrusion, and so on for a simple browsing. System security is security auditing, security testing, security hardening, virus protection, and some security of passwords, as well as service security, trusted support platform, security management, and operational security management. Basically talk about this, thank you all!

Diode Module is called silicon stack, it is made from several diodes in series, the number of the diode is by its highest pressure (maximum) negative peak pressure, main purpose is for high voltage rectifier. China Diode Module,High Voltage Diodes supplier & manufacturer, offer low price, high quality Caterpillar Diode Module,High Frequency Diode Module, etc.

Diode Module

Diode Module,High Voltage Diodes,Caterpillar Diode Module,High Frequency Diode Module

YANGZHOU POSITIONING TECH CO., LTD. , https://www.yzpst.com