Sunteți pe pagina 1din 4

2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference(IAEAC 2018)

The Research on IOT Security Architecture and Its


Key Technologies
Shan Liu1 ,Keming Yue2 ,Yu Zhang1, Hua Yang1 ,Lu Liu3 , Xiaorong Duan1
1. Shanxi Electric Power Research Institute, State Grid Corporation of China, Taiyuan, China
2. Shanxi electric power exploration and design institute co., China Energy Construction Group, Taiyuan, China
3. Shanxi Jincheng branch, China United Network Communications Corp, Jincheng, China
liushan1106@163.com, yekemingdei@sina.com, zhangyudky@sx.sgcc.com.cn, yanghuadky@sx.sgcc.com.cn,
lulu871106@163.com, duanxiaorong@sx.sgcc.com.cn

Abstract—With the development of scientific information Near Field Sensor


technology, the emergence of the Internet of Things (IOT) Communication Technology
promoted the information industry once again to a new stage of
economic and technological development. From the perspective smart card
of confidentiality, integrity, and availability of information
security, this paper analyzed the current state of the IOT and the QR code High speed
security threats, and then researched the security primary data network
technologies of the IOT security architecture. IOT security Gateway
Tracking and Internet
architecture established the foundation for a reliable information positioning
security system for the IOT.
Bar code
Keywords— Internet of Things; security architecture;RFID;
WSN; information security GPS
Fig.1. The basic model of IoT
I. INTRODUCTION
The IOT is the development of information technology in a With the popularity of the IOT, applications in various
new stage. There are a variety of information-sensing devices fields have been becoming more and more widespread. The
(such as radio frequency identification, infrared sensors, global widespread applications brought some security problems that
positioning systems, laser scanners, etc.) in the IOT. have gradually attracted people's attention. The IOT is
Accordance with the agreed implementation, through wired composed of wireless nodes with only a simple chip-level
and wireless manner, any item connects to the Internet to form embedded program. As the nodes have diversity of the target,
a huge network for communication and information exchange. there are a variety of brands and types of chips hardware.
This practice can realize a network that identified intelligently, These chips can result in heterogeneous data content and data
located, tracked, monitored, and managed. The Internet has formats. In our daily life, there are multiple applications of the
realized the sharing of information in different places. While, IOT at the application layer. Our personal information is
The IOT has opened up the channels of the virtual world and automatically collected every second by application devices.
the real world. The IOT has realized the connection of things The applications of IOT make our lives easier. These
and things, people and things at any time and place.Compared applications can even control our daily life. Therefore, if we
with the traditional Internet, the combination of enterprise lose control of the IOT system, it will become a huge potential
applications, cloud computing, and big data makes the IOT security problem [3-4]. The information security problem is
face its unique challenges [1-2]. The basic model of IoT is one of the core technologies that can guarantee the sustainable
shown below: and safe development of the IOT industry. We must attach
great importance to this issue.
From the perspective of confidentiality, integrity and
availability in information security, this paper studied the
requirements and security threats of the IOT security
architecture. Then we put forward the IOT security architecture.
Last, we further discussed the security-critical technologies of
the IoT.

II. IOT SECURITY ARCHITECTURE SYSTEM ANALYSIS

A. IOT security architecture system construction

978-1-5386-4509-3/18/$31.00 ©2018 IEEE 1277


The IOT system has three characteristics. There are transmission through mobile communication networks,
comprehensive perception, reliable delivery, and intelligent computer networks, and wireless networks. Currently, the main
processing. Comprehensive perception adopted RFID, sensors, transmission technologies at the network layer include: long-
barcodes, positioning devices to obtain information of objects distance cable technology, wireless communication technology,
at anytime and anywhere. Reliable transmission, through the and network communication technology. In the process of data
integration of various networks and the Internet, can transfer transmission, the network layer is also affected by the
the information accurately in real time. Intelligent processing propagation of fake routing information, selective
used various intelligent computing technologies (cloud forwarding/non-forwarding, black hole attacks and so on. As a
computing, etc) to analyze and process massive data and result, data cannot be efficiently transmitted to the destination,
information. And intelligent processing can implement and the network even may be corrupted.
intelligent control of objects [2]. According to the DCM model
of IOT[5], the IOT is divided into three layers: perceptual layer,
network layer, and application layer. Based on the 3) Processing layer
characteristics of the IOT, this paper divided IOT security
architecture into four layers of perceptual layer, network layer, The main function of the network layer can realize the
processing layer, and application layer. This four-layer model intelligent processing of information to analyze and process the
can build a scientific and rational security architecture, as massive data and information. The purpose of this practice can
shown in Figure 2. realize intelligent decision-making and control. Based on cloud
computing and data mining technologies, the data information
Application smart home smart transportation smart medical Information on processing layer can ensure interoperability and scalability.
layer environmental monitoring smart city content service application security Meanwhile, the data information provide a safe environment
and efficient services.
4) Application layer
data mining intelligent computing
Processing Information
layer parallel computing middleware technology cloud computing processing security The information processed by the processing layer is
transmitted to the application layer. This information is
heterogeneous. When a large amount of heterogeneous data are
Information processed on the cloud platform, a unified system and system
Network computer network mobile communication network
transmission
layer platform must be established to improve the cloud computing
wireless network 3G satellite network security
security on application-layer. In particular, data information
must strengthen access and authorization management.
Through these above measures, we can strengthen the
Perceptual RFID sensor infrared sensing Information protection of various types of data information.
layer GPS QR code actuator
collection security
B. Security needs of the IOT
Fig.2. The security architecture of IoT
The IOT can realize objects connection through the human-
1) Perceptual layer machine interfaces. The IOT often faces with a variety of
security threats, such as equipment is damaged or stolen,
The perceptual layer can realize the comprehensive unauthorized access, illegal intrusion, hacking and so on.
perception of information. Sensor network equipments, such as Sometimes, in order to deal with serious hazards, related
radio frequency identification, two-dimensional codes, and companies need to spend a lot of manpower, material and
sensors, are used for comprehensive sensing, capture, and financial resources.
measurement technologies to collect and capture information at The IOT accelerates integration with various industries. In
any time and place. First of all, it is necessary to protect RFID, the process of providing services, it also collects, transmits,
GPS, and sensors and other equipment on the all-round processes, and manages data. When we use various platforms
protection of the perceptual layer. And regular safety and software, it often registers a large amount of user personal
inspection and authentication are performed. Secondly, a information, such as name and mobile phone number, home
secure transmission mechanism for data information need to address, bank account number, even daily life trajectory and
build between sensor nodes. During transmission, data location information. The disclosure of users' personal
information cannot be transmitted by unauthorized nodes. information inevitably cause adverse effects on individuals.
And this issue should be given sufficient attention in the
development of the IOT [6].
2) Network layer
Therefore, the main requirement for building a security
architecture for the IOT is to guarantee the security,
The main function of the network layer can achieve reliable confidentiality, validity, and integrity of data information. With
transmission of information and secure data information the promotion and popularization of the IOT, network security

1278
technologies, such as firewalls, intrusion detection systems, In addition, radio signals can be used to interfere with the
and PKIs, play a protective role. Protecting user privacy and operation of nearby RFID readers. The advantage of doing this
public interest is the fundamental goal of information is that the hackers' attack behavior can be detected as quickly
confidentiality mechanism in the IOT. For example, mining as possible. And we can take some certain security measures.
data firstly requires access control mechanisms on perceptual
layer. Due to illegal disclosure of user information or public 2) Wireless sensor network(WSN) security policy
secrets, no loss is caused. In addition, illegal invasion, denial of
services attack, Sybil attacks, route attacks and so on. These WSN forms a multi-hop self-organizing network system.
attacks also affect the integrity and validity of data information. Through wireless communication, WSN consist of a large
The security features of the IOT reflect the diversity of number of sensor nodes. Its purpose is to cooperatively
perceptual information, network environments, and application perceive, collect and process the information of the perceptual
requirements. Massive and complex network data transmission objects in the network coverage area. It can realize data
and control also pose new challenges to the security collection, quantization, processing fusion and transmission
architecture of the IOT. applications. Sensor network technology-related information
security policies include sensor nodes and gateway nodes.
III. PRIMARY TECHNOLOGIES OF IOT SECURITY SYSTEM These nodes can physically capture integrity attacks,
ARCHITECTURE congestion attacks, DOS attacks, and node replication attacks.
Building a security framework for a sensor network involves
As a multi-network convergence security technology. In integrated security policies, such as encryption algorithms, key
these independent networks, a variety of security technologies distribution strategies, intrusion detection mechanisms, and
have been actually applied. Due to the limitations of the secure routing strategies [7]. Among them, the role of the
resources in the perceptual network of the IOT, it is difficult to security routing policy is the most important. The multi-path
study its security. The overall security requirements of the IOT routing policy can prevent forwarding attacks to improve the
include the security of the physical node, the security of security of the entire network.
information collection, the security of information transmission,
and the security of information process. These above security B. Information collection security policy
requirements can achieve the correctness, confidentiality and
integrity of information. The following section discusses the The function of the perceptual layer not only needs to solve
security issues on each layer of the IOT architecture. the physical security problem, but also needs to solve the
A. Physical hardware security policy problem of information collection security. The security
problems of information collection include eavesdropping,
The perceptual layer is the lowest layer of the IOT
tampering, and replay attacks. During the data collection phase,
architecture. The main function of perceptual is responsible for
the correctness, confidentiality, and integrity of the data must
the information acquisition of the IOT network. In this layer,
be ensured. First, the sensor node adopts an authentication
the most important security issue is how to ensure the security
strategy. This strategy can prevent unauthorized and malicious
of information collection and the security of physical hardware.
users to access database. This is the first line of defense for
The physical hardware include sensor devices, RFID nodes,
information security. Then, we adopt a secure routing strategy
and sensor terminals and so on.
to ensure true route discovery and effective network security
1) RFID security policy protection policy. Finally, the key management protocols in the
perceptual layer need to be strengthened, including symmetric
and asymmetric key management strategies.
RFID technology is the key technology in the IOT. And
RFID technology allows items to “talk”. The RFID tag stores C. Information processing security policy
information on specifications and interoperability. Through the
RFID data communication network, it can automatically In the architecture of the IOT, the main function of the
collect information to the central information system for processing layer is responsible for the information processing
identifying item. The basic components of RFID are Tag, mechanism. The processing layer provides an interface for
Reader and Antenna. Tag is composed of coupling elements communication between the network layer and the application
and chips. Each tag has a unique electronic code and is layer. The information transmission process has high
attached to the object to identify the target object. If electronic requirements for data confidentiality and authenticity.
tag information is obtained by hackers, the results lead to Combined with the security of the communications network,
information leakage, information tampering, man-in-the- the information transmission process can guarantee the security
middle attacks and replay attacks [7]. Therefore, we must of the IOT's transmission layer [8-9].
design a reasonable security strategy. The asymmetric
encryption algorithm is used for label information. The sender D. Information transmission security policy
encrypts the information with the public key and the receiver In the architecture of the IOT, the main task of the network
decrypts the cryptographic information with his private key. layer is to transmit information in the network. The IOT
This method can guarantee the security of the label information architecture is the implemented basic communication
to some extent. framework. The information transmission still faces numerous
security risks, such as denial of service attacks, unauthorized

1279
access, man-in-the-middle attacks, and virus attacks [10]. Since REFERENCES
data is collected by multiple devices in the IOT, security [1] Li Xianmin,Han Xiao. On the Security Architecture of Internet of
policies need to maintain the confidentiality, integrity, and Things[J].Enterprise Technology Development,2015,34(18):80-81.
availability of data at the network layer. This practice requires [2] Li Zhongnan. Research on Security Architecture for Application Layer
various authentication, filtering, and detection mechanisms to of Internet of Things[D]. Dalian Maritime University, 2013.
ensure data security. [3] Li Panlong. Research on Security Architecture for Application Layer of
Internet of Things[J].Computer Disc Software and
Applications,2014,17(16):41-42.
[4] Wu Chuankun. A preliminary discussion on the security architecture of
IV. CONCLUSION Internet of Things[J]. Proceedings of the Chinese Academy of Sciences,
2010, 25(04):411-419.
As a new industry, the IOT will encounter various security
challenges in further development and application. How to [5] Wang Boshi.Discussion on Security Architecture of Internet of
Things[J].Information Network Security,2016(S1):137-140.
build a scientific and rational security architecture play an
[6] Wang Huan.Research on Security Architecture and Key Technologies of
important role. Currently, the development and application of Internet of Things[J].Automation and Instrumentation,2016(08):80-81.
the IOT still in its infancy. There is no standardized unified [7] Ma Yalei. Research on Security Architecture and Key Technologies of
IOT architecture and technical specifications. Based on the Internet of Things[J].Electronics Production,2017(11):84-85.
analysis of the current development status of the IOT and the [8] Li Zhiqing. Security Architecture and Key Technologies of Internet of
security threats, this paper proposed a new model of IOT Things[J].Microcomputers & Applications,2011,30(09):54-56.
security system architecture combined with RFID, WSN, and [9] Gao Chong. Security Architecture and Technology Route of Internet of
primary technology. We proposed respective security Things[J].Information and Computer(Theory),2017(15):149-151.
protection strategies to promote the development and [10] Ren Wei.Research on Security Architecture and Technology Route of
application of the IOT for different layers of the IOT. Internet of Things[J].Information Network Security,2012(05):70-73.

1280

S-ar putea să vă placă și