Joke Collection Website - Blessing messages - What security threats does the Internet of Things perception layer face? How to deal with these security threats?

What security threats does the Internet of Things perception layer face? How to deal with these security threats?

Perceptual layer security threats

The security threats faced by the perception layer of the Internet of Things mainly include:

T 1 Physical attack: The attacker physically destroys the terminal of the Internet of Things, or steals the terminal equipment through cracking to obtain sensitive information of users.

T2 sensor equipment replacement threat: The attacker illegally replaces the sensor equipment, which leads to abnormal data perception and damages the normal business development.

T3 threat of impersonating a sensor node: an attacker impersonates a terminal node to join the sensor network, reports false sensing information, issues false instructions or cheats user information from a legitimate terminal node in the sensor network, which affects the normal business development.

T4 Interception, Tampering, Forging and Replay: Attackers intercept, tamper, forge and replay data and signaling transmitted in the network, so as to obtain user sensitive information or cause information transmission errors, and services cannot be carried out normally.

T5 exhaustion attack: the attacker inundates the IOT terminal, sends spam, and exhausts the terminal's power, making it unable to continue working.

T6 card abuse threat: The attacker pulls out the (U)SIM card of the Internet of Things terminal and inserts it into other terminal devices for abuse (such as making phone calls and sending text messages). ), adversely affecting the business of network operators.

The perception layer is composed of a variety of devices with the ability of perception, recognition, control and execution, and collects data of objects and surrounding environment to realize the cognition and recognition of the real physical world. The two key technologies for the perception layer to perceive the information of the physical world are radio frequency identification technology and wireless sensor network.

WSN) technology. Therefore, discussing the data information security of the Internet of Things perception layer focuses on solving the security problems of RFID system and WSN system.

RFID technology is a non-contact automatic identification technology realized by radio frequency communication. The structure of the sensing layer of the Internet of Things based on RFID technology is shown in figure 1: each RFID system is connected to the network layer as an independent network node through a gateway. Therefore, the information security under the system architecture depends on the information security of a single RFID system.