Analysis : Security Architecture Of Itu T Y.2002

1224 Words Dec 18th, 2016 5 Pages
Fig 1. Security architecture
3. Analysis of security problems
According to the proposed architecture of ITU-T Y.2002, there are only 3 layers: perception layer, transportation layer and application layer. So far, IoT does not have a standard architecture.
3.1 perception layer
Perception layer is mainly about collecting information, object perception and object control. As said in the before section there are two parts in this, they are: perception node and perception network. Perception node is used for data acquisition and data control, perception network sends the collected data to the gate way or sends the control instruction to the controller. There are different layers in perception they are: RFID, WSNs, RSN, GPS, etc. this section mainly analyses these technologies foe the security problems in this layer
3.1.1 Security issues of RFID technology and solutions
Radio frequency identification is a non-contact automatic identification technology. This is used to get relevant data as it automatically identifies the target tag signal. Although it has some advantages, it is also exposed to a lot of problems as it is widely used. Uniform coding:
Currently there is no uniform international encoding standard for RFID tagging. There are two most influential standards: universal identification (UID) this standard is supported by japan and EPC is one more standard which is supported by European. The problem here is the reader cannot obtain access to the tag information…
Open Document