Documente Academic
Documente Profesional
Documente Cultură
1278
technologies, such as firewalls, intrusion detection systems, In addition, radio signals can be used to interfere with the
and PKIs, play a protective role. Protecting user privacy and operation of nearby RFID readers. The advantage of doing this
public interest is the fundamental goal of information is that the hackers' attack behavior can be detected as quickly
confidentiality mechanism in the IOT. For example, mining as possible. And we can take some certain security measures.
data firstly requires access control mechanisms on perceptual
layer. Due to illegal disclosure of user information or public 2) Wireless sensor network(WSN) security policy
secrets, no loss is caused. In addition, illegal invasion, denial of
services attack, Sybil attacks, route attacks and so on. These WSN forms a multi-hop self-organizing network system.
attacks also affect the integrity and validity of data information. Through wireless communication, WSN consist of a large
The security features of the IOT reflect the diversity of number of sensor nodes. Its purpose is to cooperatively
perceptual information, network environments, and application perceive, collect and process the information of the perceptual
requirements. Massive and complex network data transmission objects in the network coverage area. It can realize data
and control also pose new challenges to the security collection, quantization, processing fusion and transmission
architecture of the IOT. applications. Sensor network technology-related information
security policies include sensor nodes and gateway nodes.
III. PRIMARY TECHNOLOGIES OF IOT SECURITY SYSTEM These nodes can physically capture integrity attacks,
ARCHITECTURE congestion attacks, DOS attacks, and node replication attacks.
Building a security framework for a sensor network involves
As a multi-network convergence security technology. In integrated security policies, such as encryption algorithms, key
these independent networks, a variety of security technologies distribution strategies, intrusion detection mechanisms, and
have been actually applied. Due to the limitations of the secure routing strategies [7]. Among them, the role of the
resources in the perceptual network of the IOT, it is difficult to security routing policy is the most important. The multi-path
study its security. The overall security requirements of the IOT routing policy can prevent forwarding attacks to improve the
include the security of the physical node, the security of security of the entire network.
information collection, the security of information transmission,
and the security of information process. These above security B. Information collection security policy
requirements can achieve the correctness, confidentiality and
integrity of information. The following section discusses the The function of the perceptual layer not only needs to solve
security issues on each layer of the IOT architecture. the physical security problem, but also needs to solve the
A. Physical hardware security policy problem of information collection security. The security
problems of information collection include eavesdropping,
The perceptual layer is the lowest layer of the IOT
tampering, and replay attacks. During the data collection phase,
architecture. The main function of perceptual is responsible for
the correctness, confidentiality, and integrity of the data must
the information acquisition of the IOT network. In this layer,
be ensured. First, the sensor node adopts an authentication
the most important security issue is how to ensure the security
strategy. This strategy can prevent unauthorized and malicious
of information collection and the security of physical hardware.
users to access database. This is the first line of defense for
The physical hardware include sensor devices, RFID nodes,
information security. Then, we adopt a secure routing strategy
and sensor terminals and so on.
to ensure true route discovery and effective network security
1) RFID security policy protection policy. Finally, the key management protocols in the
perceptual layer need to be strengthened, including symmetric
and asymmetric key management strategies.
RFID technology is the key technology in the IOT. And
RFID technology allows items to “talk”. The RFID tag stores C. Information processing security policy
information on specifications and interoperability. Through the
RFID data communication network, it can automatically In the architecture of the IOT, the main function of the
collect information to the central information system for processing layer is responsible for the information processing
identifying item. The basic components of RFID are Tag, mechanism. The processing layer provides an interface for
Reader and Antenna. Tag is composed of coupling elements communication between the network layer and the application
and chips. Each tag has a unique electronic code and is layer. The information transmission process has high
attached to the object to identify the target object. If electronic requirements for data confidentiality and authenticity.
tag information is obtained by hackers, the results lead to Combined with the security of the communications network,
information leakage, information tampering, man-in-the- the information transmission process can guarantee the security
middle attacks and replay attacks [7]. Therefore, we must of the IOT's transmission layer [8-9].
design a reasonable security strategy. The asymmetric
encryption algorithm is used for label information. The sender D. Information transmission security policy
encrypts the information with the public key and the receiver In the architecture of the IOT, the main task of the network
decrypts the cryptographic information with his private key. layer is to transmit information in the network. The IOT
This method can guarantee the security of the label information architecture is the implemented basic communication
to some extent. framework. The information transmission still faces numerous
security risks, such as denial of service attacks, unauthorized
1279
access, man-in-the-middle attacks, and virus attacks [10]. Since REFERENCES
data is collected by multiple devices in the IOT, security [1] Li Xianmin,Han Xiao. On the Security Architecture of Internet of
policies need to maintain the confidentiality, integrity, and Things[J].Enterprise Technology Development,2015,34(18):80-81.
availability of data at the network layer. This practice requires [2] Li Zhongnan. Research on Security Architecture for Application Layer
various authentication, filtering, and detection mechanisms to of Internet of Things[D]. Dalian Maritime University, 2013.
ensure data security. [3] Li Panlong. Research on Security Architecture for Application Layer of
Internet of Things[J].Computer Disc Software and
Applications,2014,17(16):41-42.
[4] Wu Chuankun. A preliminary discussion on the security architecture of
IV. CONCLUSION Internet of Things[J]. Proceedings of the Chinese Academy of Sciences,
2010, 25(04):411-419.
As a new industry, the IOT will encounter various security
challenges in further development and application. How to [5] Wang Boshi.Discussion on Security Architecture of Internet of
Things[J].Information Network Security,2016(S1):137-140.
build a scientific and rational security architecture play an
[6] Wang Huan.Research on Security Architecture and Key Technologies of
important role. Currently, the development and application of Internet of Things[J].Automation and Instrumentation,2016(08):80-81.
the IOT still in its infancy. There is no standardized unified [7] Ma Yalei. Research on Security Architecture and Key Technologies of
IOT architecture and technical specifications. Based on the Internet of Things[J].Electronics Production,2017(11):84-85.
analysis of the current development status of the IOT and the [8] Li Zhiqing. Security Architecture and Key Technologies of Internet of
security threats, this paper proposed a new model of IOT Things[J].Microcomputers & Applications,2011,30(09):54-56.
security system architecture combined with RFID, WSN, and [9] Gao Chong. Security Architecture and Technology Route of Internet of
primary technology. We proposed respective security Things[J].Information and Computer(Theory),2017(15):149-151.
protection strategies to promote the development and [10] Ren Wei.Research on Security Architecture and Technology Route of
application of the IOT for different layers of the IOT. Internet of Things[J].Information Network Security,2012(05):70-73.
1280