当前位置:网站首页>Historical evolution, application and security requirements of the Internet of things
Historical evolution, application and security requirements of the Internet of things
2022-04-21 16:16:00 【Software test network】
without doubt , Security is a big problem of the Internet of things , More and more attention . Due to the limited space and the scope of the author's knowledge , We only focus on the basic security requirements of the Internet of things , The known attack methods are mentioned separately for each specific security requirement .
History and its evolution
The term "Internet of things" comes from RFID( RFID ) Technology evolved from , During world war ii , British researchers have built “Identify Friend or Foe” abbreviation IFF, Identification of friend or foe ; Whenever a British plane receives a signal from the British Army radar , The plane will pass RFID Broadcast a signal , Identify the plane as a friend . from 1950 Year to 1960 year , From the U.S. 、 Researchers in Europe and Japan have successfully used radio frequency energy to remotely identify objects . Soon , With the development of anti-theft system , This technology has been commercialized .1970 years , Los Alamos National Laboratory deployed a device , Used to monitor radioactive substances and transport vehicles using transponders . The technology 1980 Commercialization in the mid-s .
The USDA faces the problem of identifying cattle , Like cows , It needs to be determined whether each cow has received the correct dose of Medicine , Make sure cows don't get double doses by mistake . Los Alamos National Laboratory through the use of UHF Passive detection of radio wave tags RFID To uniquely identify each cow , So that solves the problem . thereafter , Many companies have developed such systems , Use smaller transponders encapsulated in glass and injected into bovine skin ; This technology has been used until now .Kevin Ashton stay 1999 In, it first created... In the context of intelligent transportation system “ The Internet of things ” The word" , Soon the era of interconnection began .1998 Massachusetts Institute of technology Sarma and Brock Connect physical objects to the Internet through tags , take RFID Shaped into an interactive technology . With card I Frequency repeaters are also used to implement controlled access to buildings . in addition to , Wireless self-organization (wireless ad-hoc) And sensor networks can be considered without IP Address the ancestor of the Internet of things .
The first decade of the 21st century is the era of microelectronics and communication ;WSN And wireless Ad-hoc The Internet is on the rise .WSN By providing free wireless communication 、 The ability to perceive and collect data from regions , It provides extensive support for the interaction between people and their surroundings . Usually , The deployment of this network collects data and transmits it to the receiver . The current definition of the Internet of things is “Anything”, “Anytime” and “Anywhere”, All things are interconnected .
Different applications of the Internet of things
The history and development of the Internet of things show that , from the beginning , This technology is considered suitable for commercial applications . The characteristics of connecting and interacting with different things make the Internet of things suitable for various applications , It can be used to solve many real-life problems . The following summarizes some of its practical applications .
- Health care : Healthcare monitoring system , telemedicine , Doctors can monitor patients remotely .
- Smart home : In order to improve the quality of life , Washing machine 、 toaster 、 Coffee machine 、 Air conditioner 、 TV 、 The refrigerator 、 Smart phones can be used for household appliances such as security cameras 、 Tablet or connection Internet Laptop control .
- Wearable device : These devices are implanted with sensors and actuators , It can communicate through Bluetooth and other technologies . They are usually worn on the wrist or connected to the body through smart phones to track human activities .
- Agriculture : In order to increase crop yield and economic benefits , Introduced smart agriculture . Agricultural Internet of things is used for irrigation control 、 Monitor warehouse and farm animals .
- Intelligent supply chain management : In order to reduce operating costs , Proper management of real-time data , And realize raw material suppliers 、 shipper 、 Multi party secure communication between manufacturers and customers , The Internet of things has entered potential application scenarios .
- Smart grid : Because the Internet of things realizes the communication between smart meter and remote power socket ], It provides high-quality energy at the lowest cost , Analyze consumption patterns and achieve load balancing .
- Industrial Internet and intelligent manufacturing : Using the Internet of things in industry can achieve better power management 、 resource optimization , It helps to reduce costs . Some applications of the Internet of things involve using robots to improve accuracy and intelligent logistics management .
- Smart city : This application of the Internet of things involves solving medical care problems 、 water 、 energy 、 All services for problems in areas such as traffic management , So as to realize smart city .
- Intelligent Transportation : The Internet of things connects transport vehicles 、 Roadside assets 、 Traffic lights and dynamic traffic management system , It plays an important role in realizing fast and safe traffic .
- Connected cars : Under this theme , Cars and other vehicles and things around them are interconnected to share data inside and outside the vehicle , To improve the safety and luxury of travel .
- Intelligent security : In student safety 、 Application of building safety system and disaster management , The Internet of things helps play a better security effect .
- Environmental protection : Internet of things can play an important role in environmental monitoring , Because wireless sensor networks can be used to monitor air and water quality 、 Weather and soil conditions .
The classification and composition of the Internet of things
The applications mentioned in the previous section contain a wide variety of things . In this section , We divide them into different categories ; These devices are described below . chart 1 Shows different IOT devices and platforms .
- Sensors are used to “ perception ” The equipment ; The main task of sensors is to sense events or changes in the physical environment , And boot another gadget or computer system .
Internet of things devices and platforms
- WSN Wireless sensor network is a group of special sensors deployed in a wide geographical area , Used to monitor and record changes in physical conditions . They send the collected data to a central location .
- RFID It is a technology that collects data into computer system with the help of RF
- Actuators actuator , Convert a signal into some kind of motion , Like linear 、 Spin, etc , Excitement with expectations for the physical world . sensor / Actuator network (SANET) Wireless sensor and actuator networks (WSAN) Are networks that can sense changes in the environment and use actuators to take appropriate action .
- Internet of things devices
- Wearable device : This category includes wearable on the body , Equipment that can also communicate .
- Embedded system : Including sensors 、 Objects of actuators and processors , These objects are composed of software systems and API control , Together they create a connected environment .
- Smart devices : Electronic equipment , Usually connected to other devices , Can interact and run autonomously .
- Communication devices can communicate with other devices using wired or wireless media . Usually , They have rich computing resources and support GPS Technology .
- Internet of things platform as a service (PaaS) It is allowed to rent cloud infrastructure suitable for various Internet of things applications .
Internet of things security requirements
Up to now , Readers may have been interested in the development of the Internet of things 、 What are the differences in the Internet of things “ thing ” And the practical application of the Internet of things . Before focusing on safety , Let's discuss the basic security requirements and possible attacks on them . The main security requirements of the Internet of things are as follows :
- confidentiality : Information must not be disclosed to any unauthorized entity . Because connected devices may transmit confidential data , Therefore, confidentiality is very important .
- integrity : Refers to the security of assets used in the Internet of things system . Sensitive data is also stored in IOT On local devices . These data include sensitive data and personal data 、 Medical records 、 Manufacturing data 、 Media decryption key 、 Log etc. , This makes integrity a major security requirement .
- to grant authorization : Determine whether a person or computer can access resources or problem instructions . If an unauthorized person does so , It may lead to the failure of the Internet of things system .
- Usability : perhaps , When an authorized entity requests access to any resource , It must always be accessible , Otherwise, this may lead to several problems related to function and quality of service .
- Authenticity : When the device requests service from the remote server , Authentication becomes very important . Source information must be authenticated ; This verification is usually done through authentication technology involving authentication .
- Non repudiation : When two IOT entities deliver messages between them , It cannot be denied after sending ; This property is usually implemented using a trusted third party .
- Accountability : Ensure that every operation of each user or device can be taken care of , So that you can easily find the wrong entity . let me put it another way , It helps to identify concerns “ Who did what ”.
- reliability : It is the requirement to ensure that the Internet of things system works consistently and reliably to provide various services . It refers to the attribute of ensuring the stability of the behavior of the Internet of things system .
- Privacy : Privacy in the Internet of things refers to the control of user privacy data disclosure . It is an important attribute in the context of the Internet of things .
- Physical security : Most IOT devices are deployed remotely , Therefore, physical protection is needed to protect them from unauthorized physical access 、 Damage and side channel attack .
The following figure clearly illustrates the main security requirements and the corresponding attacks on them .
Security requirements and attack methods in the Internet of things
版权声明
本文为[Software test network]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204211614426349.html
边栏推荐
- 函数栈帧的创建和销毁(了解)
- Burp is a simple TP5 rce passive scanning plug-in
- 几种单USB转多串口的方案
- 目前5G SoC 芯片技术成熟吗?
- 目前主流的手机SOC芯片都有哪些?
- OJ每日一练——等级成绩
- Yunna: is the asset management system of large medical equipment expensive? Main contents of hospital asset management
- 云呐:医院固定资产管理存在的问题及原因,资产管理系统的实施
- . net swagger configuration
- 喝汽水问题
猜你喜欢

2022年重庆最新建筑施工焊工(建筑特种作业)模拟题库及答案

Add release configuration in clion

哪种耳机戴着耳朵不痛?不入耳佩戴的骨传导耳机

dom操作元素 总结

Changan dark blue's first product can be pure electricity, extended range and hydrogen electricity, with an acceleration of 5.9s

打卡:4.21 C语言篇 -(1)初识C语言 - (11)关键字register,#define定义的宏

How does infotnews memes, myths and NFT build cultural identity?

Qt5.14.2编译mysql

Arthas Tunnel使用

mingw下载
随机推荐
云呐:机房资产管理系统web版,设备资产信息管理的应用
小米Civi 1S 定价2299元起,主打美颜,让你上镜自由
[Android, kotlin] teaches you to write a weak reference handler tool to avoid memory leakage
全国查询水电气费免费接口(一)
PowerShell blog directory
R语言广义线性模型函数GLM、广义线性模型(Generalized linear models)、glm函数构建逻辑回归模型(Logistic regression)
AT2293 [AGC009D] Uninity(贪心、状压)
OJ每日一练——字符个数
剑指offer day23 数学(简单)
C coordinate click WebBrowser1
OJ daily practice - number of characters
OJ每日一练——发放奖金
启动Redis的过程
HMC foundation big Ma robot synchronization token HMC (seaman) will launch pancakeswap
Servlet
魅族官方刷机教程地址(免费)
[2023 questions d'appel d'offres] Huawei Personality Evaluation (Comprehensive Evaluation) Strategic Guide
App和小程序有哪些区别?
Infrastructure 知识: DNS 命令: dig, host
金仓数据库KingbaseES V8R3集群在线删除数据节点案例

