Article Preview
Top1. Introduction
The Internet of Things is usually composed of a large number of unattended sensor nodes. The traditional intrusion detection system is difficult to adapt to the power source of the sensor node in the Internet of Things that limited computing ability and limited storage space. Therefore, it is lightweight and Reconstruction is a feasible way to meet the requirements of intrusion detection applications in the context of Internet of the Things. Government, enterprises, scientific research institutions more and more attention to the Internet security issues, for the perception of equipment security Some technical means, including the high-intensity encryption CPU card, RFID tags for the certification, key management mechanism and from the production process using the anti-power consumption/electromagnetic radiation analysis, the fault injection attack technology and so on. Can you see whether these safety precautions are effective on the one hand? Does it meet the relevant standards? It needs to be further clear (Lee, et al., 2013; Perera, et al., 2014; Whitmore, et al., 2015).
Internet security issues involving the network equipment based security, network security, Web security, and based on many aspects, such as Web application security, especially in the Internet of things in this article the Internet part, its content mainly includes security coding, safety and key management and exchange data frames. We firstly review them as the follows.
- ●
Key management and exchange: In the Internet implements the confidentiality and the complete measure key lies in the key the establishment and the management process, because in the thing networking node computation ability, power source ability and so on are limited that causes traditional the key management way not to be suitable under the thing networking the Internet.
- ●
Security code: Since any one of the label identification or identification code can be remotely scanned arbitrarily, and the label automatically, without distinguishing the response to the reader and the information stored in the reader to the reader, so the security of the code must be taken seriously (Al-Fuqaha, Guizani, Mohammadi, Aledhari,& Ayyash, 2015).
- ●
Security: data frames in the Internet information dissemination environment, an attacker could eavesdrop on content of the basic data frame, access to relevant information prepare the way for further attacks (Tao, Cheng, Xu, Zhang, & Li, 2014).
Figure 1. The security model of internet of things from different levels
The Figure 1 shows the particularity of the composition of the Internet of things, both has the solid facility equipment, and has the intelligence transmission which the network moves. Moreover after its equipment usually deploys the general networking first, therefore, the thing networking node mostly is at nobody guarding the condition, besides has the mobile communication network tradition network security question, but also has some with to have the migration network security different special security problem as follows.