Research on the Security Hidden Trouble of Internet of Things Based on RFID

With the mature application of RFID technology in various fields, it is inseparable from the application of the Internet of Things. However, the current data security and privacy security issues in IoT applications based on RFID technology have become the bottleneck of the future development of the Internet of Things. Therefore, the research on the security risks of the Internet of Things based on RFID technology has become an urgent and widespread concern. In this paper, the RFID technology, the RFID system group, the working principle and the components of the Internet of Things based on RFID technology are analyzed. At the same time, the main causes, main attack methods and security strategies of the potential and security risks of the Internet of Things are studied. .

Internet of Things (IoT) is a comprehensive information system that interconnects objects with perception as the core. It will become the third wave of the information industry after computers and the Internet. The Internet of Things connects real-world physical space and virtual information space, making data-aware, intelligent information processing, and wireless information transmission ubiquitous. At present, the Internet of Things has been highly valued by governments, academia and enterprises. The developed countries such as the United States have incorporated the research of this technology into national and regional informatization strategies. Obviously, the Internet of Things has become an important factor in the competition of countries for comprehensive national strength.

Through the sensors, RFID technology, mobile phones, positioning systems and other equipment, the Internet of Things connects all the objects in the world to the information network, fully embodies the integration of physical space and information space, and also provides the object to the object. The interconnection between things, people and people, thus narrowing the distance between the information system and the physical world, and constructing an "Internet ofThings" covering everything in the world. One of its core technologies is RFID technology.

In the IoT system based on RFID technology, the communication between the tag layer and the reader/writer layer is realized by the radio frequency signal between the tag layer and the reader/writer layer, and the Internet solves the communication between the reader layer and the application system layer. However, because the Internet of Things allows all objects to be connected to the Internet and is applied to all walks of life and all aspects of daily life, it is closely related to national security, economic security, and privacy. In addition to the security problems of traditional networks, the Internet of Things also has the confidentiality, integrity, reliability, and illegal identification and tracking of objects when they are perceived and interacted.

1.RFID technology

RFID is also a non-contact automatic ID recognition technology. It automatically recognizes the ID number of the target object through the RF signal, and collects and accurately processes the information of the object in a fast, real-time and accurate manner. The RFID tag has waterproof, anti-magnetic, high-temperature, high reading distance, free storage information, large storage capacity, can encrypt data on the label, can identify moving objects, and can be operated conveniently and quickly, so RFID technology is applicable to various fields and working environment.

1.1 The basic components of the RFID system

The RFID system generally consists of three layers: a tag, a reader, and an antenna. The label layer is composed of a chip and a coupling element, and each label has a unique electronic code attached to the identification object. The electronic data of the agreed format is stored in the electronic tag, and then the electronic tag is attached to the surface of the recognized object. The reader layer is a device for reading and writing tag information, which can read and write and identify data in the electronic tag without contact. Usually the reader is connected to the computer, and the read information is transmitted to the computer through the network for further processing. The antenna is used to transmit RF signals between the tag layer and the reader layer.

1.2 The basic working principle of RFID system

A communication channel for establishing a wireless signal between the reader layer and the tag layer in the RFID system. The process occurring in the spatial transmission channel can be summarized into three event models: data exchange is the purpose; timing is the implementation of data exchange; energy is the basis for the realization of timing. The reader layer uses the antenna to emit electromagnetic signals. When the tag is in the working range of the reader, the tag obtains the command data and energy from the electromagnetic signal, and sends the tag identification and data back to the reader in the form of electromagnetic signals to complete the reading. Operation; of course, the reader can also rewrite the data stored in the RFID tag. Therefore, the reader can not only receive the data sent by the tag, but also write the data to the tag. Of course, it is more important to communicate with the server through the interface to realize data transmission.

2. Composition of IoT system based on RFID technology

A network of RFID technology links all the objects in the world, and items can “communicate” with each other. The RFID tag stores the information of the item, and the information obtained by the reader/writer must be automatically collected into the central information system through the wireless data communication network to realize the item identification; the information sharing and exchange are realized through the computer network. That is to say, all things in the world can be connected to the Internet through information sensing such as RFID, and finally realize intelligent identification and management. The Internet of Things has become a sensor network based on RFID technology, so the Internet of Things system based on RFID technology is composed of two levels: physical world and logical space.

2.1 Physical world

The physical world of IoT systems consists of a variety of real objects, including wireless sensors, objects, and computers, which are physically interconnected in the Internet of Things. Not only that, but it is also the mutual communication and connection between the physical world and the virtual world. The Internet of Things can make the physical world information automatically accepted by the virtual world, so that the wisdom and information of the physical world can communicate with people to achieve human development wisdom. purpose.

2.2 logical space

The logical space of the Internet of Things system consists of a label layer, a reader/writer layer, a communication layer, an Internet layer, and an application layer.

(1) label layer

The label layer consists of an RFID tag and an item. The RFID tag is similar to a common bar code, and is generally attached to or embedded in the surface of the item, and stores information about the item.

(2) reader layer

The RFID reader is a wireless transmitting and receiving device, which mainly includes a radio frequency module and a digital signal processing unit. The reader reads and writes the tag, and the reader demodulates and decodes the received radio frequency signal, and then sends it to the network through the network. The application system processes. So it has strong storage and computing power.

(3) Communication layer

Between the label layer and the reader/writer layer, the identification object is automatically identified by the radio frequency signal, and related information is read to complete communication.

(4) Internet layer

The communication between the reader layer and the application system layer is implemented by the Internet.

(5) Application system layer

The application system implements transparent management of the identifier, and generally includes a database system that can run on any hardware platform, and stores information related to the RFID tag. Of course, it can be selected by the user according to actual conditions.

Previous [1] [2] Next