Things card security risks should be how to eliminate it

Disclaimer: This article is a blogger original article, shall not be reproduced without the bloggers allowed. https://blog.csdn.net/qq_40798435/article/details/90519245

  Although the three major domestic carriers and many Internet companies are keen to join the war of things, but we know that things card is still there is a big safety problems. Suggestions of things you want to in the industry long-term development, and industry-leading brands to master the technology, it can enhance the security of networking applications from the following five aspects.

  1, the establishment of key management mechanisms in the perception layer, the use of technical means to ensure that a given speech perception layer data confidentiality and authentication information is still very necessary.

  2, in the transport layer security mechanism, the node can process authentication and key agreement protocol between nodes transporting layer, according to actual needs or select the appropriate security algorithms and data integrity verification services.

  3, end to end security using authentication mechanisms that can be the basis of the key agreement proposed to do on added-end data integrity verification mechanisms and confidentiality algorithm to select mechanism.

  4, security measures can be taken in the process layer have database access control mechanisms, content filtering mechanisms to protect the privacy of information technology, data encryption technology, information disclosure, tracking, data read and write operations recording technology, intellectual property rights protection technology, and data destruction technology.

  5, the network side thereof with respect, for it in terms of recognition and sensing is perceived by a number of nodes common to achieve, and the sensing node that under normal circumstances are single function, and in particular is itself member very rare, so it has no way to make it complicated security and protection related capabilities, plus generally have not thought about this part of the monitoring, vandals have easy access to them. To solve this problem, we recommend the establishment of a remote device control operational management of the platform, for among those nodes is broken, the network can automatically heal, network-related functions will not be affected.

  Of course, in the safe use and to enhance the application of networking technology, the major things card service providers are also in constant efforts, I believe that no matter at what time, will uphold an open and cooperative attitude, to provide customers with low-cost, things quality professional information service access solutions.

Guess you like

Origin blog.csdn.net/qq_40798435/article/details/90519245