Let security redefine the design of IoT products

Due to the rapid development of the Internet of Things (IoT), the issue of data security has become increasingly prominent. According to relevant data, nearly 70% of the existing connected devices are vulnerable to cyber attacks, resulting in data loss or theft. This figure undoubtedly makes us feel terrible, and also makes us raise the security of IoT data. On the agenda.

Internet of Things hides high risks

The stalwart blueprint of the Internet of Things is to make everything on the earth smarter and communicate with each other. Imagine, when a car fails, automatically telling you which component has a problem; when the building automatically prompts you which part needs reinforcement and repair, what kind of spectacular scene will the world be?

Behind the beautiful scene, there is a security crisis. The Stuxnet attack that occurred in 2011 eventually led to damage to the centrifuge and disrupted the core processing capacity of the entire facility. The control system that was attacked caused the centrifuge to deviate slightly from the allowable parameters, but the report showed that everything was normal until no damage was reported before the centrifuge was damaged.

In view of this, the Internet of Things has an urgent need for security.

Analysis of WSN Security Technology in Internet of Things Perception Layer

As one of the indispensable systems of the Internet of Things, strengthening the security of WSN is also an indispensable task. Here are some WSN security technology applications for everyone.

(1) Key management

Key management is the core of information security technology and the core of WSN security technology. There are four main types of key management: simple key distribution protocol, dynamic key management protocol, key pre-distribution protocol, and layered key management protocol.

In the simple key distribution protocol, all nodes use the same key, and the sender encrypts it with this key, and the receiver also decrypts it with this key. This key distribution protocol occupies very little memory and it is clearly the worst security. Thus, in WSN technology, this protocol is rarely used.

In the dynamic key management protocol, the key of the node is periodically replaced according to the needs of the user, and a dynamic key management mode is formed. This key distribution protocol can effectively guarantee the security of the network.

In a key pre-distribution protocol, a network node is assigned a set of keys before deployment. After the node is deployed, the sensor node establishes a node shared key and redistributes the key. This key distribution protocol can also effectively ensure the security of the network.

In the layered key management protocol, the LEAP protocol is adopted, which is a typical deterministic key management protocol, which uses a variety of key mechanisms to jointly maintain network security. In each node, four keys are allocated, which are the identity key shared by the pre-distributed base station, the key group shared by the pre-distributed intra-network nodes, the neighbor key shared by the neighboring nodes, and the cluster head shared. Cluster head key. This key distribution protocol is the most efficient and secure of the protection.

WSN key management methods can be divided into symmetric key encryption and asymmetric key encryption. The feature of symmetric key encryption is that the two sides of the communication use the same key, and the sender uses this key for encryption, and the receiver also uses this key for decryption. The key encryption technology has a short key length, relatively small computation, communication, and storage overhead, and is more suitable for WSN, and thus is the mainstream method for WSN key management. Non-symmetric key encryption means that nodes use different encryption and decryption keys. Due to their high computational, storage, communication and other capabilities, they have long been considered unsuitable for WSN. However, recent studies have shown that asymmetric Key encryption can be applied to WSN after optimization. From the perspective of information security, the security of asymmetric key system must be much higher than that of symmetric key system.

In order to solve the physical damage problem of the WSN node, the tamper-resistant device can be used in the node to add a layer of protection for the node protection. A physical damage sensing mechanism can be added to provide early warning of physical damage. In addition, some sensitive information can be encrypted and stored using a lightweight symmetric encryption algorithm to protect information security.

For example, the STM32W MCU family introduced by ST is an IEEE 802.15.4-based SoC with an ARM Cortex-M3 24MHz processor, built-in 64~128KB flash memory, and 8K SRAM. It supports ZigBee and 6LoWPAN protocols and has AES. -128 hardware encryption to ensure data transmission security.

(2) Secure routing

The special architecture of the Internet of Things makes it more demanding on routing security. Therefore, appropriate security routing protocols should be adopted according to the needs of different applications of the Internet of Things to ensure data is safely transferred from one node to another. At the same time, node resources should be consumed as little as possible to ensure efficient operation of the nodes. The SPINS security framework protocol is adopted in the IoT secure routing technology. It includes the SNEP protocol and the μTESLA protocol. The SNEP protocol is used to implement confidentiality, integrity and point-to-point authentication. The μTESLA protocol is used to implement the point. To a number of broadcast certifications. The SPINS security framework protocol effectively guarantees IoT routing security. However, the SPINS protocol is only a framework protocol, and does not specify a specific algorithm for implementing various security mechanisms. Therefore, in the specific application, many implementation issues of the SPINS protocol should also be considered.

(3) Node authentication

Node authentication can prevent unauthorized users from accessing the nodes and data of the Internet of Things sensing layer, effectively ensuring the information security of the sensing layer. At present, the main node authentication technologies in sensor networks are: authentication methods based on lightweight public key algorithm, authentication methods based on pre-shared keys, authentication methods based on random key pre-distribution, and authentication methods based on single-item hash functions. When the node is laid, the specific application requirements and the actual capabilities of the nodes should be fully considered, and the corresponding authentication mechanism should be adopted.

(4) Access control

Access to information resources in the network must be established under the premise of orderly access control. For different visitors, their operational rights should be specified, such as whether they are readable, writable, and allowed to be modified. Centralized management of all information resources in the WSN to ensure secure access to information resources.

For example, Silicon Labs' Ember ZigBee development tool uses EM35x series SoC. Its EM351/EM357 high-performance series, built-in 32-bit ARM Cortex-M3 processor, operating clock is 6, 12, 24MHz, including 128~192KB Flash memory with read protection, security monitoring, 12KB RAM, and AES-128 hardware encryption. Suitable for smart energy harvesting, building or home automation control, and WSN applications.

(5) Intrusion detection

Intrusion detection is a network security technology that actively protects the system from attacks. It monitors and collects information at several key nodes of the network, analyzes it, finds out problems, and blocks and tracks it in time. The node behavior is monitored to detect suspicious behavior in a timely manner. The nodes in the Internet of Things are widely distributed and the security is relatively weak. Therefore, distributed intrusion detection mechanisms should be adopted.

Countermeasures for Enterprise Information Security of Internet of Things

As the largest group of IoT users, enterprises should not be limited to applications, but should also strengthen measures in information security. Here are some new strategies for enterprise data security. Companies can take measures to strengthen the backbone of the Internet of Things. Partially - machine-to-machine (M2M) communication security. Engineers can also fully protect M2M devices by integrating passive, proactive and reactive safety measures.

Passive security methods, such as tamper-proof mechanisms, can also be used to easily prevent signal interception and block cybercriminals from performing simple "black box" analysis of devices;

Proactive security processes, such as transport layer-based security-based encryption and certificate-based authentication, can increase the difficulty of device cracking, thereby preventing potential attacks by criminals;

Reactive security measures can detect unauthorized intrusions and minimize the impact of attacks. These security combinations protect the system from a wide range of threats, including information eavesdropping, data forgery, and device impersonation.

To better realize the potential of the Internet of Things, these are the most effective ways to build security for every IoT device.

Conclusion: The development and application of the Internet of Things is deeply dependent on security. As long as the security issues are properly solved, will the Internet of Things era be far behind?

0 times
Window._bd_share_config = { "common": { "bdSnsKey": {}, "bdText": "", "bdMini": "2", "bdMiniList": false, "bdPic": "", "bdStyle": " 0", "bdSize": "24" }, "share": {}, "image": { "viewList": ["qzone", "tsina", "tqq", "renren", "weixin"], "viewText": "Share to:", "viewSize": "16" }, "selectShare": { "bdContainerClass": null, "bdSelectMiniList": ["qzone", "tsina", "tqq", "renren" , "weixin"] } }; with (document) 0[(getElementsByTagName('head')[0] || body).appendChild(createElement('script')).src = 'http://bdimg.share. Baidu.com/static/api/js/share.js?v=89860593.js?cdnversion=' + ~(-new Date() / 36e5)];

Patch panels are commonly used in computer networking, recording studios, and radio and television.

We are professional Network Patch Panel manufacturer in China. Our patch panel includes voice type 25port voice patch panel and 50port voice patch panel, data type (cat.5e,cat.6, cat.6a) with 6/12/24/48port on option. We use good PCD board and IDC connectors (krone IDC, 110 IDC, Dual IDC for option) to ensure the characters for each product. Specially for 24port Cat5e.UTP patch panel ,we offer not only in flat configuration as normal but also offer angel patch panels configuration.

The patch panel is offered universal wiring both T568A and T568B. We will do the Fluke test before selling our network patch panel.

19 Inch Patch Panel

Fiber Optic Patch Panel, Blank Patch Panel, Cat6a Patch Panel, Cat5e Patch Panel, Patch Panel Wall Mount

NINGBO YULIANG TELECOM MUNICATIONS EQUIPMENT CO.,LTD. , https://www.yltelecom.com