第一篇:物聯(lián)網(wǎng)時代安全與隱私的新挑戰(zhàn)_總結(jié)
物聯(lián)網(wǎng)時代安全與隱私的新挑戰(zhàn) 總結(jié):
主要從物聯(lián)網(wǎng)的發(fā)展帶來的安全隱患展開。
1.講的所謂的cross-layer是說的攻擊者可以從硬件、軟件任意方面找到漏洞或其他方法進(jìn)行攻擊,以前就更多的注重軟件上的安全。2.由此引入硬件安全的幾種解決方法
對于硬件芯片的加密,簡略說明了用puf(舉例說的是芯片SRAM初始化未擦除前的隨機數(shù)來作為puf)進(jìn)行加密,加密過程略過,也列出了他們自己用PUF的加密結(jié)構(gòu);
對于代碼惡意注入和串接使用,使用修改cpu指令集的方法..就是之后的hafix/hafix++.又引入了TI的一款SOC產(chǎn)品,說明了其利用RF電路噪聲作為加密的方案,但是一旦通過在外發(fā)送RF信號來擾亂其電路,系統(tǒng)加密就無法進(jìn)行,具體的改進(jìn)沒有說。
也介紹了Mifare的公交卡的一套加密算法,被人用顯微鏡觀看芯片破解
最后講了一下通過硬件來保護(hù)系統(tǒng)安全,跟我們學(xué)校的那個TPM可信平臺很像,也是獨立于cpu的一套可信掛載設(shè)備。
還介紹了2個硬件會議在最后
總體來說,感覺更像是一個科普。
8 9
第二篇:物聯(lián)網(wǎng)在安全和隱私方面的新挑戰(zhàn)
英文文獻(xiàn)
Internet of Things–New security and privacy challenges
Rolf H.Weber University of Zurich, Zurich, Switzerland, and University of Hong Kong, Hong Kong
abstract
The Internet of Things,an emerging global Internet-based technical architecture facilitating the exchange of goods and services in global supply chain networks has an impact on the security and privacy of the involved stakeholders.Measures ensuring the architecture’s resilience to attacks, data authentication, access control and client privacy need to be established.An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector according to specific needs and thereby becomes easily adjustable.The contents of the respective legislation must encompass the right to information, provisions prohibiting or restricting the use of mechanisms of the Internet of Things, rules on IT-security-legislation, provisions supporting the use of mechanisms of the Internet of Things and the establishment of a task force doing research on the legal challenges of the IoT.a 2010 Prof Rolf H.Weber.Published by Elsevier Ltd.All rights reserved.Keywords:Data protection,Internet of Things,Privacy,RFID,Security 1.Internet of Things: notion and technical background The Internet of Things(IoT)is an emerging global Internet-based information architecture facilitating the exchange of goods and services in global supply chain networks.1Forexample, the lack of certain goods would automatically be reported to the provider which in turn immediately causes electronic or physical delivery.From a technical point of view,the architecture is based on data communication tools,primarily RFID-tagged items(Radio-Frequency Identification).The IoT has the purpose of providing an IT-infra-structure facilitating the exchanges of ‘‘things’’ in a secure and reliable manner.The most popular industry proposal for the new IT-infra-structure of the IoT is based on an Electronic Product Code(EPC), introduced by EPC global and GS1.The ‘‘things’’ are physical objects carrying RFID tags with a unique EPC;the infrastructure can offer and query EPC Information Services(EPCIS)both locally and remotely to subscribers.The information is not fully saved on an RFID tag, but a supply of the information by distributed servers on the Internet is made available through linking and cross-linking with the help of an Object Naming Service(ONS).The ONS is authoritative(linking meta data and services)in the sense that the entity having – centralized – change control over the information about the EPC is the same entity that assigned the EPC to the concerned item.8Thereby, the architecture can also serve as backbone for ubiquitous computing,enabling smart environments to recognize and identify objects, and receive information from the Internet to facilitate their adaptive functionality.The central ONS root is operated by the(private)company VeriSign, a provider of Internet infrastructure services.The ONS is based on the well-known Domain Name System(DNS).Technically, in order to use the DNS to find information about an item, the item’s EPC must be converted into a format that the DNS can understand, which is the typical, ‘‘dot’’ delimited, left to right form of all domain names.Since EPC is encoded into syntactically correct domain name and then used within the existing DNS infra-structure, the ONS can be considered as subset of the DNS.For this reason, however, the ONS will also inherit all of the well-documented DNS weaknesses, such as the limited redundancy in practical implementations and the creation of single points of failure.2.Security and privacy needs 2.1.Requirements related to IoT technology
The described technical architecture of the IoT has an impact on the security and privacy of the involved stakeholders.Privacy includes the concealment of personal information aswell as the ability to control what happens with this information.12The right to privacy can be considered as either a basic and inalienable human right, or as a personal right or possession.The attribution of tags to objects may not be known tousers, and there may not be an acoustic or visual signal to draw the attention of the object’s user.Thereby, individuals can be followed without them even knowing about it and would leave their data or at least traces thereof in cyberspace.Further aggravating the problem, it is not anymore only the state that is interested in collecting the respective data, but also private actors such as marketing enterprises.15Since business processes are concerned, a high degree of reliability is needed.In the literature, the following security and privacy requirements are described: Resilience to attacks: The system has to avoid single points of failure and should adjust itself to node failures.Data authentication: As a principle, retrieved address and object information must be authenticated.Access control: Information providers must be able to implement access control on the data provided.Client privacy: Measures need to be taken that only the information provider is able to infer from observing the use of the lookup system related to a specific customer;at least,inference should be very hard to conduct.Private enterprises using IoT technology will have to include these requirements into their risk management concept governing the business activities in general.2.2.Privacy enhancing technologies(PET)The fulfilment of customer privacy requirements is quite difficult.A number of technologies have been developed in order to achieve information privacy goals.These Privacy Enhancing Technologies(PET)can be described in short as follows: Virtual Private Networks(VPN)are extranets established by close groups of business partners.As only partners have access, they promise to be confidential and have integrity.However, this solution does not allow for a dynamic global information exchange and is impractical with regard to third parties beyond the borders of the extranet.Transport Layer Security(TLS), based on an appropriate global trust structure, could also improve confidentiality and integrity of the IoT.However, as each ONS delegation step requires a new TLS connection, the search of information would be negatively affected by many additional layers.DNS Security Extensions(DNSSEC)make use of public-key cryptography to sign resource records in order to guarantee origin authenticity and integrity of delivered information.However, DNSSEC could only assure global ONS information authenticity if the entire Internet community adopts it.Onion Routing encrypts and mixes Internet traffic from many different sources, i.e.data is wrapped into multiple encryption layers, using the public keys of the onion routers on the transmission path.This process would impede matching a particular Internet Protocol packet to a particular source.However, onion routing increases waiting times and thereby results in performance issues.Private Information Retrieval(PIR)systems conceal which customer is interested in which information, once the EPCIS have been located.However, problems of scalability and key management, as well as performance issues would arise in a globally accessible system such as the ONS, which makes this method impractical.A further method to increase security and privacy are Peer-to-Peer(P2P)systems, which generally show good scalability and performance in the applications.These P2P systems could be based on Distributed Hash Tables(DHT).Access control,however, must be implemented at the actual EPCIS itself, not on the data stored in the DHT, as there is no encryption offered by any of these two designs.20Insofar, the assumption is reasonable that encryption of the EPCIS connection and authentication of the customer could be implemented without major difficulties, using common Internet and web service security frameworks.In particular, the authentication of the customer can be done by issuing shared secrets or using public-key cryptography.It is important that an RFID tag having been attached to an object can – at a later stage – be disabled in order to allow for customers to decide whether they want to make use of the tag.RFID tags may either be disabled by putting them in a protective mesh of foil known as a ‘‘Faraday Cage’’ which is impenetrable by radio signals of certain frequencies
or
by‘‘killing’’
them,i.e.removing
and
destroying them.However,both options have certain disadvantages.While putting tags in a special cage is relatively safe, it requires that every tag from every single product is put in that cage if a customer desires so.Chances are that certain tags will be overlooked and left with the client and that he/she could still be traced.Sending a ‘‘kill’’ command to a tag leaves room to the possibility of reactivation or that some identifying information could be left on the tag.Furthermore, businesses may be inclined to offer clients incentives for not destroying tags or secretly give them tags.Instead of killing tags, the dissolution of the connection between the tag and the identifiable object could be envisaged.The information on ONS is deleted to protect the privacy of the owner of the tagged object.While the tag can still be read, further information with potential information concerning the respective person, however, are not retrievable.Moreover, transparency is also needed for non-personally identifiable information retrieved by RFID.An active RFID can for example trace movements of visitors of an event real time without identifying the persons as such who remain anonymous;nevertheless, the question remains whether such information not covered by traditional privacy laws might be collected without any restriction.2.3.Legal course of action The European Commission is aware of the security and privacy issues related to the RFID and the IoT.In a Recommendation of May 12, 2009 on the implementation of privacy and data protection principles in applications supported by radio-frequency identification27the European Commission invites the Member States to provide for guidance on the design and operation of RFID applications in a lawful, ethical and socially and politically acceptable way, respecting the right to privacy and ensuring protection of personal data(No.1).In particular, the Recommendation outlines measures to betaken for the deployment of RFID application to ensure that national legislation is complying with the EU Data Protection Directives 95/46, 99/5 and 2002/58(No.2).Member States should ensure that industry in collaboration with relevant civil society stakeholders develops a framework for privacy and data protection impact assessments(PIA;No.4);this framework should be submitted to the Article 29 Data Protection Working Party within 12 months.Industry and civil society stakeholders are in the process of establishing the requested framework PIA until late 2009.The objectives of the PIA are designed to identify the implications of the application on privacy and data protection, to determine whether the operator has taken appropriate technical and organizational measures to ensure respective protection, to document the measures implemented with respect to the appropriate protection, and to serve as a basis for a PIA report that can be submitted to the competent authorities before deployment of the application.Presumably, the framework should serve to determine a common structure and content of reports.In particular, RFID application description and scope, RFID application governing practices, accountability and analysis and resolution seem to be of importance.Furthermore, operators are asked to conduct an assessment of the implications of the application implementation for the protection of personal data and privacy and take appropriate technical and organizational measures to ensure the protection of personal data and privacy(No.5), and a person within a business needs to be designated for the review of the assessments and the continued appropriateness of the technical and organizational measures.In addition, Member States are invited to support the EU Commission in identifying those applications that might raise information security threats with implications for the general public(No.6).Additional provisions of the Recommendation concern the information and transparency on RFID use, the RFID applications used in the retail trade, the awareness raising actions, research and development as well as follow-up actions(Nos.7–18).In its specific Communication to the European Parliament,the Council, the European Economic and Social Committee and the Committee of the Regions on the Internet of Things(an Action Plan for Europe), the EU Commission again points to the importance of security and privacy in the IoT frame-work.The particular Line of Action 2 encompasses the continuous monitoring of the privacy and the protection of personal data questions;as part of Line of Action 3 the EU Commission is envisaging to launch a debate on the technical and the legal aspects of the ‘‘right to silence of the chips’’ and expresses the idea that individuals should be able to disconnect from their networked environment at any time.3.Milestones of an adequate legal framework The implementation of the IoT architecture and the use of RFID pose a number of legal challenges;the basic questions of the agenda can be phrased as follows: Is there a need for(international or national)state law or are market regulations of the concerned businesses sufficient? If legislation is envisaged: Would existing/traditional legislation be sufficient or is there a need for new laws? If new laws are to be released: Which kind of laws are required and what is the time frame for their implementation? These legal challenges need to be embedded into the human rights and constitutional framework.Insofar, the decision of the German Supreme Court of 27 February 2008 constituting an independent fundamental right of confidentiality and integrity related to info-technical systems merits attention.3.1.Systematic approach The establishment and implementation of an appropriate legal framework31calls for a systematic approach in relation to the legislative process.Thereby, the following aspects should be taken into account: Facts about RFID using scenarios are to be systematically developed;only under the condition that the facts are sufficiently known, adequate legal provisions can be drafted.A systematization of the legal problems potentially occur-ring can be done by coordination along the below discussed four technical axes, namely globality, verticality, ubiquity and technicity.The legal challenges of security and privacy issues related to the IoT and RFID are to be qualitatively classified.In particular, the question must be addressed how much privacy the civil society is prepared to surrender in order to increase security.Solutions should be looked for allowing considering privacy and security not as opposites, but as principles affecting each other.In light of the manifold factual scenarios, it appears to be hardly possible to come to a homogenous legal framework governing all facets of the IoT and RFID.Moreover, a heterogeneous and differentiated approach will have to be taken into account.Thereby, the technical environment can be crystallized along the four axes, representing the most important challenges to the establishment of regulation: Globality is based on the fact that goods and services in the IoT context will be globally marketed and distributed.The RFID technology is also ‘‘global’’ in the sense that the same technical processes are applied all over the world.Consequently, business and trade would be heavily complicated if differing national laws would be in place.If the RFID-tagged products are available on a global level, the legal systems need to be synchronized.Verticality means the potential durability of the technical environment.In particular, it is important for the life of the IoT that RFID-tagged products are lasting long enough to not only use them in the supply chain until the final customer, but also for example in the waste management.For the time being,this requirement is not sufficiently met in the EPC traffic.Ubiquity refers to the extent of the RFID-tagged environment;technically, RFID could indeed be used ubiquitously encompassing persons, things, plants, and animals.Technicity is an important basis for the development of rules protecting privacy objectives.Several differentiations can be taken into account, namely(i)the complexity of the tag(active and passive, rewritable, processing and sensor provided products),(ii)the complexity of background devices(reader or other linked media)and the maximum reading range which is particularly designed to cover transparency demands.These four requirements have to be taken into account when establishing a legal framework binding all participants of the IoT.Resulting from these four requirements, the framework to be established has to be global, i.e.Established by an international legislator, and applicable to every object on earth from its becoming until its destruction.The ubiquity needs to be addressed in particular if various objects are put together to form a new ‘‘thing’’.This new ‘‘thing’’ can either be attributed with a new tag, or the creation can carry multiple tags.While the first scenario is more practical, this solution may leave businesses with the problem that individual parts cannot be traced back to their origin.A solution may be that the one tag attached to the object makes reference to the different sources of all individual parts.A global consensus needs to be found, which is then generally applied.The question raised is also connected to the fourth requirement, technicity.If composed objects keep all the tags of integrated parts, tracing all relevant information concerning that object becomes extremely complex and difficult.As this discussion demonstrates,determining an appropriate legal framework raises various technical questions.Therefore, the inclusion of technical experts in the process-making seems inevitable.Furthermore,the discussion also shows that the framework needs to be established at an international level and address all fundamental issues.Otherwise, the IoT becomes impractical and cannot be used efficiently.The following conclusion for a potential legislation can be drawn from the mentioned systematic approach: A unique strategy will not be suitable to satisfactorily cope with the privacy challenges of the IoT.Inevitably, legislators have to make good use of several of them.In particular, due consideration of technicity seems to be of major importance.Furthermore, data protection and privacy need communication strategies establishing an effective platform for dialogue between state legislators, non-governmental organizations,public interest groups and the international private sector.3.2.State law or self-regulation The establishment of an adequate legal framework for the protection of security and privacy in the IoT is a phenomenon giving rise to the question of the appropriate legal source.Various regulatory models are available in theory: Apart from the possibility of no regulation at all, which cannot be considered as a real ‘‘solution’’, the choice is principally between traditional national regulation, international agreements and self-regulation.As mentioned, national regulation has the disadvantage of not meeting the globalization needs of an adequate legal framework in view of the fact that transactions through the IoT are usually of a cross-border nature.(i)So far, the regulatory model in the IoT is based on self-regulation through manifold business standards, starting from technical guidelines and leading to fair information practices.In particular, the EPC-Guidelines rely on components like ‘‘Consumer Notice’’, ‘‘Consumer Education’’ and ‘‘Retention and IT-Security Policy’’.Consequently, the compliance with the EPC-Guidelines is driven by a self-control strategy.This self-regulatory model follows the well-known principle of subsidiarity,meaning that the participants of a specific community try to find suitable solutions(structures, behaviors)them-selves as long as government intervention has not taken place.The legitimacy of self-regulation is based on the fact that private incentives lead to a need-driven rule-setting process.Furthermore, self-regulation is less costly and more flexible than State law.In principle, self-regulation is justified if it is more efficient than state law and if compliance with rules of the community is less likely than compliance with self-regulation.The theoretical approaches to the self-regulatory model show a multifaceted picture: In many cases, self-regulation is not more than a concept of a private group, namely a concept occurring within a framework that is set by the government(directed self-regulation or audited self-regulation).This approach has gained importance during the last decade: if the government provides for a general framework which can be substantiated by the private sector often the term ‘‘co-regulation’’ is used.The state legislator does not only set the legal yardsticks or some general pillars of the legal framework, but eventually the government remains involved in the self-regulatory initiatives at least in a monitoring function supervising the progress and the effectiveness of the initiatives in meeting the perceived objectives.In this context, the legal doctrine has developed the notion‘‘soft law’’ for private commitments expressing more than just policy statements, but less than law in its strict sense, also possessing a certain proximity to law and a certain legal relevance.Nevertheless, the term ‘‘soft law’’ does not yet have a clear scope or reliable content.Particularly in respect to the enforceability of rules, law is either in force(‘‘hard law’’)or not in force(‘‘no law’’), meaning that it is difficult to distinguish between various degrees of legal force.Generally, it can only be said that soft law is a social notion close to law and that it usually covers certain forms of expected and acceptable.codes of conduct.This concept of self-regulation cannot overcome the lack of an enforcement strategy if compliance is not done voluntarily.Therefore, the involvement of the legislator seems to be inevitable.While self-regulation has gained importance during the last years, there are still critics thereof, pointing out that self-regulatory mechanisms only regulate those motivated or principled enough to take part in them as market pressure is not yet strong enough to oblige everyone to adopt the respective rules.Furthermore, it is argued that self-regulation is only adopted by stakeholders to satisfy their own interests and is therefore not effective in the protection of privacy.(ii)Therefore, even if the manifold merits of self-regulation are to be honoured, some pillars of the legal framework in the context of security and privacy need to be set by the legislator.Such law would have to be introduced on an international level.Contemporary theories addressing international law aspects tend to acknowledge a wide definition of international law, according to which this field is no longer limited merely to relations between nation states but generally accepts the increasing role of other international players such as individual human beings, international organizations and juridical entities.Since customary rules can hardly develop in a fast moving field such as the IoT, the main legal source is to beseen in the general principles of law, such as good will,equal treatment, fairness in business activities, legal validity of agreements etc.These general principles can be illustrated as ‘‘a(chǎn)bstractions form a mass of rules’’which have been ‘‘so long and so generally accepted as tobe no longer directly connected with state practice’’.To some extent, basic legal principles are considered to be an expression of ‘‘natural law’’;practically, general legal principles may be so fundamental that they can be found in virtually every legal system.The specific problem in view of security and privacy,however, consists in the appreciation that privacy concerns are not identical in the different regions of the world which makes the application of general principles difficult in cross-border business activities.Therefore, a basic legal framework should be introduced by an international legislator;however,the details of the legal rules for the protection of security and privacy needs are to be developed by the private sector.The IoT being a new system itself, the idea of entrusting a body with its legislation and governing that is new, too, is not far-fetched.A new body would be in the position to take into account all the characteristics of the IoT.Furthermore,considering the complexity of the IoT, this body could be construed in a way to dispose of the necessary capacities.The alternative to the creation of a new body is to integrate the task of international legislator for the IoT in an existing organization.Bearing in mind the globality of the IoT, this organization has to have a certain scope of territorial application.Furthermore, the organization should have a structure that allows for the inclusion of a body only responsible for the IoT.Finally, legislation and governing of the IoT should be encompassed by the overhead responsibilities of the organization to be appointed.When considering these requirements, the World Trade Organization(WTO)and the Organization for Economic Co-Operation and Development(OECD)come to mind.A special Committee responsible for rule-setting and supervision in the IoT could be established as an answer to the question of an international legislator.This Committee would be made up of representatives of WTO or OECD member States, thereby assuring an international approach.The Committee could,after deliberations, issue formal agreements, standards and models, recommendations or guidelines on various issues of the IoT.This evaluation coincides with the experiences made in the field of Internet governance in general.An internationally binding agreement covering privacy and data protection does not yet exist.Even if international human rights instruments usually embody the essence of privacy, at least to a certain extent, the protection cannot be considered as being sufficient;only ‘‘extreme’’ warranties are legally guaranteed, such as the respect for private life or the avoidance of exposure to arbitrary or unlawful interference.Therefore, it is widely accepted that co-regulation is needed to secure the implementation of effective principles of privacy in the online world.Possible elements of a self-regulatory scheme may include codes of conduct containing rules for best practices worked out in accordance with substantive data protection principles, the establishment of internal control procedures(compliance rules), the setting-up of hotlines to handle complaints from the public, and transparent data protection policies.Many international instruments, such as the Guidelines of the OECD and Art.27 of the EC Directive on the Protection of Personal Data(1995),mention self-regulation as an appropriate tool.Nevertheless, security and the protection of privacy is nota matter to be addressed exclusively by a legislator.Research and development in the field of information technology should also consider ethical consequences of new inventions.3.3.Legal categories and scenarios Future legislation encompassing privacy and data protection issues of the IoT and RFID could have five different goals: Right-to-know-legislation;Prohibition-legislation;IT-security-legislation;Utilization-legislation;Task-force-legislation.The different categories of future legislation should be evaluated in the light of the objectives of privacy and personal data protection depending upon the use of RFID which can concern the following aspects, namely: Monitoring products(EPC), Monitoring animals(real-time authentication and monitoring of animals), Monitoring persons(real-time authentication and monitoring of persons), Collecting data for profiling purposes(aggregation).In the context of the IoT, the EPC scenario concerning products is practically the most important application.Theoretically, EPC does not directly trace relational personal data, however, a person carrying an RFID-tagged item discloses to the organization using the RFID system certain data or gives at least the opportunity to collect information.A specific legislative aspect concerns the term ‘‘person’’.The EU Directives as well as many national laws only consider individuals(‘‘natural persons’’)as objects of privacy laws.In particular, in the context of the IoT, this understanding is too narrow.Legal persons(e.g.corporations)do also have privacy interests;as for example in the Swiss legislation, the scope of application of data protection law needs to be extended to legal persons.(i)The right-to-know-legislation has the purpose to keep the customer informed about the applied RFID scenarios.In other words, the customer should know which data are collected and should also have the possibility to deactivate the tags after a purchase.In the United States,several attempts have been take to realize such kind of legislation.(ii)The prohibition-legislation introduces provisions which envisage to forbid or at least to restrict the use of RFID incertain scenarios.Such an approach is traditional instate legislation if the public community dislikes a certain behavior;enforcement of prohibition is possible(at least in the books).Self-regulatory mechanisms rather tend to introduce incentives(if at all)instead of prohibition.(iii)IT-security-legislation encompasses initiatives that demand the establishment of certain IT-security standards which should protect that application of RFID from unauthorized reading and rewriting.63Such kind of provisions can be introduced by the state legislator, but also by self-regulatory mechanisms;typically, industry standards are developed by the concerned market participants, having therefore the chance to be observed by the respective developers.Technologically, a new‘‘fourth generation’’ framework of data protection proto-cols should be developed allowing the setting-up of stringent safeguards as to reporting and frequent audits of the measures.(iv)Utilization-legislation intends to support the use of RFID in certain scenarios.Insofar, this approach stands contrary to the prohibition-legislation;it envisages making the RFID available in the relevant identification documents.Therefore, the legislative approach has to fine-tune an appropriate balance between prohibited and utilizable approaches.(v)The task-force-legislation covers legal provisions supporting the technical community to invest into the research of the legal challenges of RFID;the purpose of this approach consists in a better understanding of the relevant problems.3.4.Evaluation of the European legislative approach The Recommendation of May 12, 2009, of the European Commission is a framework approach to legislate in the field of Internet security.The Recommendation provides guidance to Member States which then have to enact specific rules.While the Recommendation makes reference to EU Data Protection Directives, it does not stipulate any specific provisions itself.The European Commission furthermore introduces a framework privacy and impact assessment,established by the industry and the relevant civil society stakeholders, and the publication of an information policy for applications should also be ensured by Member States.EPCglobal and industry are currently establishing the requested framework(Private Impact Assessment, PIA).Even if its details are not known as of early November 2009, it can be said that the objectives of the PIA are designed to identify the implications on privacy and data protection, to determine whether the operator has taken appropriate technical and organizational measures to ensure respective protection, to document the implemented measures, and to serve as a basis for a PIA report to the competent authorities.Important aspects concern the RFID application description and scope,the RFID application governing practices, the accountability challenges, as well as analysis and resolution aspects.Finally,while the European Commission provides for this framework,Member States are strongly encouraged to support the Commission in identifying threats to information security.The regulatory approach of the European Commission consists in vague framework guidelines which address many aspects without considering the merits of the self-regulatory models and industry standardization.The framework is formulated in an open way and thereby ensures that technical principles such as verticality, ubiquity and technicity can be taken into account.However, being established by the Euro-pean Commission, it is only applicable for Member States in Europe and not globally.Moreover, the fact that it is up to Member States should establish more detailed regulation is even more prejudicial to the principle of globality.Nevertheless, the recent Recommendation and Communication by the European Commission attest that privacy and data protection problems in the field of the Internet of Things are taken seriously and that there is a strong will to establish mechanisms to ensure that those do not become accurate once the Internet of Things operates large-scale.4.Outlook With the emergence of an Internet of Things, new regulatory approaches to ensure its privacy and security become necessary.In particular, attacks have to be intercepted, data authenticated, access controlled and the privacy of customers(natural and legal persons)guaranteed.The nature of the IoT asks for a heterogeneous and differentiated legal framework that adequately takes into account the globality, verticality,ubiquity and technicity of the IoT.Geographically limited national legislation does not seem appropriate in this context.However, self-regulation as it has been applied up to now may not be sufficient to ensure effective privacy and security, either.Therefore, a framework of substantive key principles set by a legislator at the inter-national level, complemented by the private sector with more detailed regulation seems to be the best solution.Through such a framework, general pillars of regulation could be set for everyone, which are then suitable to be supplemented by the individuals concerned in a way that suits their current needs.Furthermore, the inclusion of an international legislator in the process also ensures the continued involvement of the public sector, contributing at least by monitoring the process.The approach chosen by the European Commission goes in that direction.However, it would be preferable to have an international(not European)legislator setting the framework;such an approach would better adapt to the needs stemming from the globality of the IoT.Furthermore, if a more detailed regulation should be established by the private sector, lessons can be drawn from Internet governance in general, where the private sector has already marked presence in the rule-setting.The content of the respective legislation has to cover the right to information, provisions prohibiting or restricting the use of mechanisms of the Internet of Things, rules on IT-security-legislation, provisions supporting the use of mechanisms of the Internet of Things and the establishment of a task force doing research on the legal challenges of the IoT.While according mechanisms still need to be developed,the early recognition of eventual problems and suggestions for their encounter leaves hope that effective regulation can be established before the Internet of Things is in full operation.Prof.Dr.Rolf H.Weber(rolf.weber@rwi.uzh.ch)is professor at the University of Zurich and a visiting professor at the University of Hong Kong.Rolf H.Weber studied at the University of Zurich and at the Harvard Law School.Since 1995 he is chair professor at the University of Zurich and since 2006 a visiting professor at the University of Hong Kong, teaching and publishing in civil, commercial and European law with special topics in Internet, media and competition law, international finance and trade regulation.He is director of the European Law Institute and the Center for Information and Communication Law at the University of Zurich;in addition he is member of the directory of the Postgraduate Studies in International Business Law and the MBA-Program at the University of Zurich.Since 2008 Prof.Dr.Rolf H.Weber is member of the Steering Committee of the Global Internet Governance Academic Network(GigaNet)and since 2009 he is member of the High-level Panel of Advisers of the Global Alliance for Information and Communication Technologies and Development(GAID).Besides, he is engaged as an attorney-at-law and as a member of the editorial board of several Swiss and international legal periodicals.A first version of this contribution has been published in Sylvia M.Kierkegaard(ed.), Legal Discourse in Cyberlaw and Trade, 2009, 1–14.The author expresses his gratitude to lic.iur.Romana Weber for her valuable research support.物聯(lián)網(wǎng)在安全和隱私方面的新挑戰(zhàn)
羅爾夫·H·韋伯
瑞士,蘇黎世,蘇黎世大學(xué)與香港,香港大學(xué)
摘要
物聯(lián)網(wǎng),一種新興的以互聯(lián)網(wǎng)為基礎(chǔ)的技術(shù)體系結(jié)構(gòu),為全球商品和服務(wù)的交流提供便利的供應(yīng)鏈網(wǎng)絡(luò),其對所涉及的利益相關(guān)者的安全和隱私方面產(chǎn)生一定的影響。我們需要確保架構(gòu)的抵御攻擊性,必須建立數(shù)據(jù)驗證,訪問控制和客戶隱私保護(hù)等措施。底層技術(shù)必須采取適當(dāng)?shù)姆煽蚣?,最好是建立一個國際的立法委員會,根據(jù)具體的需求輔之以私營部門,從而容易調(diào)節(jié)。有關(guān)法例的內(nèi)容必須包含信息的正確性,規(guī)定禁止或限制使用的物聯(lián)網(wǎng)機制,按照IT安全立法的規(guī)定,使用配套的物聯(lián)網(wǎng)機制,并成立一個專責(zé)小組,研究物聯(lián)網(wǎng)在法律方面的挑戰(zhàn)。
2010羅爾夫·H·韋伯教授。由Elsevier公司出版。保留所有權(quán)利。
關(guān)鍵詞:數(shù)據(jù)保護(hù) 物聯(lián)網(wǎng) 隱私 RFID 安全
1、物聯(lián)網(wǎng):概念和技術(shù)背景
物聯(lián)網(wǎng)(IOT)是一個新興的以全球互聯(lián)網(wǎng)為基礎(chǔ)的信息架構(gòu),為全球商品和服務(wù)的交流提供便利的供應(yīng)鏈網(wǎng)絡(luò)。例如,在缺乏某些商品的時候會自動報告給供應(yīng)商,然后立即產(chǎn)生電子或?qū)嵨锝桓丁募夹g(shù)角度來看,該體系結(jié)構(gòu)是基于數(shù)據(jù)通信的工具,主要是RFID標(biāo)簽的物品(無線射頻識別)。物聯(lián)網(wǎng)的目的是在IT基礎(chǔ)設(shè)施結(jié)構(gòu)上,促進(jìn)“物”在安全和可靠的方式下交流。
最熱門的行業(yè)建議物聯(lián)網(wǎng)的新IT基礎(chǔ)結(jié)構(gòu)要基于產(chǎn)品電子代碼(EPC)來介紹全球EPC和GS1的?!拔铩笔且粋€含有唯一EPC 的RFID標(biāo)簽;在該基礎(chǔ)設(shè)施可以提供和查詢EPC信息服務(wù)(EPCIS)給本地和遠(yuǎn)程用戶。一個RFID標(biāo)簽上保存的信息是不完整的,而供應(yīng)信息是由互聯(lián)網(wǎng)上的分布式服務(wù)器和對象命名服務(wù)(ONS)連接和交叉連接提供的。
在某種意義上,國家統(tǒng)計局就是權(quán)威,有關(guān)EPC信息的實體具有集中、變化、控制相同的實體分配在EPC的有關(guān)資料。因此,對于無處不在的計算,體系結(jié)構(gòu)也可以作為骨干,從而實現(xiàn)環(huán)境的智能認(rèn)識和識別物體,并接收來自互聯(lián)網(wǎng)的信息,以方便他們的自適應(yīng)功能。中央ONS的基礎(chǔ)是由(私人)公司威瑞信構(gòu)造的,它是一個互聯(lián)網(wǎng)基礎(chǔ)設(shè)施服務(wù)提供商。
國家統(tǒng)計局是知名的域名系統(tǒng)(DNS)。在技術(shù)上,為了使用DNS來尋找有關(guān)的項目,該項目的EPC必須被轉(zhuǎn)換成一種DNS可以理解的格式,這是典型的“點”分隔符,所有域名的形式從左到右。由于EPC編碼成域名語法上是正確的,那么在現(xiàn)有的DNS基礎(chǔ)結(jié)構(gòu)內(nèi),ONS可以視為該域名系統(tǒng)(DNS)的一個子集。不過,由于這個原因,國家統(tǒng)計局也將承認(rèn)被所有的證據(jù)充分證明的DNS弱點,如在實際的實現(xiàn)和創(chuàng)造中單點故障的有限的冗余。
2、安全和隱私需求
2.1 相關(guān)物聯(lián)網(wǎng)技術(shù)的要求
物聯(lián)網(wǎng)技術(shù)架構(gòu)所涉及的利益相關(guān)者在安全和隱私方面的影響。隱私包括個人信息的隱蔽性,以及有能力控制這個信息會發(fā)生什么。私隱權(quán)可以被認(rèn)為是一個基本的不可剝奪的權(quán)利,或作為個人的權(quán)利或財產(chǎn)。標(biāo)簽對象的歸屬可能不被用戶知道,并有可能是不能吸引用戶注意的聲音或視覺信號。因此,個體可以追尋而他們甚至不知道它將在其網(wǎng)絡(luò)空間中留下自己的數(shù)據(jù)或痕跡的。事件的進(jìn)一步發(fā)展,使它已不再是只有國家所感興趣,也有私人角色在收集相應(yīng)的數(shù)據(jù),如銷售企業(yè)。
對于業(yè)務(wù)流程來說,高度的可靠性是必要的。以下是本文對安全性和保密性要求的說明:
抵抗攻擊:系統(tǒng)可以避免單一點的失敗和調(diào)節(jié)節(jié)點的失??; 數(shù)據(jù)驗證:作為一項原則,檢索地址和目標(biāo)信息必須經(jīng)過認(rèn)證; 訪問控制:信息提供商必須能夠?qū)崿F(xiàn)所提供數(shù)據(jù)的訪問控制;
客戶隱私:需要采取措施使只有信息提供者可以從觀察到查找特定客戶系統(tǒng)的使用;至少,推斷應(yīng)該是很困難地從事。
民營企業(yè)使用物聯(lián)網(wǎng)技術(shù)時,在一般管理業(yè)務(wù)活動中必須要他們擁有這些風(fēng)險管理理念的要求。
2.2增強隱私的技術(shù)(PET)
滿足客戶的隱私要求是相當(dāng)困難的。一些技術(shù)已經(jīng)被開發(fā),以實現(xiàn)信息隱私的目的。這些增強隱私的技術(shù)(PET)可以簡短地描述為以下幾個:
虛擬專用網(wǎng)(VPN)是外聯(lián)網(wǎng)建立的密切的業(yè)務(wù)合作伙伴團體。由于合作伙伴的訪問,所以他們要保證信息機密性和完整性。但是,這個方案并不允許全球信息的動態(tài)交流,而且是不切實際的對于超越國界的第三方外聯(lián)網(wǎng)。
傳輸層安全性(TLS),基于一個相應(yīng)的全球信托機構(gòu)也可以提高物聯(lián)網(wǎng)的保密性和完整性。然而,由于各ONS授權(quán)需要一個新的TLS連接,搜索的信息將受到許多附加層的負(fù)面影響。
DNS安全擴展(DNSSEC)使用公鑰加密簽署的資源記錄,以保證原產(chǎn)地傳遞信息的真實性和完整性。然而,如果整個互聯(lián)網(wǎng)界都采用DNSSEC,則只能保證全球ONS信息的真實性。
洋蔥路由加密和融合了許多不同來源的互聯(lián)網(wǎng)流量。即,洋蔥路由器在傳輸路徑上使用公共密鑰把數(shù)據(jù)包裹成多個加密層。這個過程會阻礙一個特定的互聯(lián)網(wǎng)協(xié)議數(shù)據(jù)包發(fā)送到一個相匹配的特定源。然而,洋蔥路由增加等待時間,從而導(dǎo)致性能問題。
當(dāng)EPCIS已被設(shè)置時,私人信息檢索系統(tǒng)(PIR)會隱瞞客戶感興趣的信息。然而,全局可訪問系統(tǒng)(如ONS)的可擴展性問題和密鑰管理,以及性能問題的出現(xiàn),使這種方法是不切實際的。
另一種提高安全性和隱私的方法是對等(P2P)系統(tǒng),該系統(tǒng)在應(yīng)用程序中通常表現(xiàn)出良好的可擴展性和性能。這些P2P系統(tǒng)可以基于分布式哈希表(DHT)。然而,訪問控制必須在實際的EPCIS本身實施,而不是對在DHT的數(shù)據(jù)存儲,因為沒有為這兩個設(shè)計所服務(wù)的任何加密。在假設(shè)是合理的情況下,對于EPCIS連接的加密和認(rèn)證,客戶使用普通的互聯(lián)網(wǎng)和Web服務(wù)安全框架沒有大的困難。特別地,認(rèn)證的客戶可以發(fā)布共享機密或使用公共密鑰加密。
重要的是,為了讓客戶來決定是否要使用該標(biāo)簽,附在物體上的RFID標(biāo)簽被可以在較后階段被禁用。RFID標(biāo)簽可以被它們稱為“法拉第籠”的金屬箔防護(hù)網(wǎng)禁用,這是令人費解的,一定頻率的無線電信號可以“殺死”他們,即消除并摧毀他們。然而,這兩種選擇有一定的缺點。把標(biāo)簽放在一個特殊的籠子里,是比較安全的,如果客戶希望如此,它需要把每一個產(chǎn)品的每一個標(biāo)簽都放在籠中。有可能特定的標(biāo)簽被忽略后,客戶端和他/她仍然可以被追蹤。發(fā)送“殺”命令使標(biāo)簽離開空間不能被激活,或使一些識別信息離開標(biāo)簽。此外,企業(yè)可能會傾向于不破壞標(biāo)簽而為客戶提供激勵,或暗中給他們標(biāo)簽。可以設(shè)想,解散標(biāo)簽和識別物體之間的連接而不是殺死標(biāo)簽。刪除ONS上的信息,以保護(hù)標(biāo)簽對象所有者的隱私。雖然標(biāo)簽仍然可以被讀取,然而相應(yīng)的人的潛在信息和進(jìn)一步資料是不會被檢索出來的。
此外,透明度也需要檢索非個人身份識別信息的RFID。例如有源RFID沒有確定這個人時會保持實時跟蹤匿名游客的運動;然而,是否收集這些未涉及傳統(tǒng)隱私權(quán)法律的資料可以不受任何限制的問題仍然存在。
2.3法律方面的方針
歐盟委員會也意識到有關(guān)于RFID和物聯(lián)網(wǎng)的安全及隱私問題。在2009年5月12日的建議書中把無線射頻識別應(yīng)用到隱私和數(shù)據(jù)保護(hù)的原則中。歐盟委員會邀請會員國提供和指導(dǎo)RFID應(yīng)用在法律、道德、社會和政治上以可以接受的方式設(shè)計和經(jīng)營,尊重隱私和權(quán)利,同時確保個人數(shù)據(jù)的保護(hù)(第1號)。特別地,建議書概述了RFID應(yīng)用的部署應(yīng)采取的措施,以確保國家立法符合歐盟數(shù)據(jù)保護(hù)指令95/46,99/5,2002/58(第2號)。會員國應(yīng)確保該行業(yè)與相關(guān)的民間社會利益攸關(guān)方合作開發(fā)一個框架關(guān)于隱私和數(shù)據(jù)保護(hù)的影響及評估(PIA第4號);該數(shù)據(jù)保護(hù)工作小組應(yīng)在12個月內(nèi)提交該框架的29條。直到2009年年底,工業(yè)和民間社會利益相關(guān)者還在建立PIA框架這個過程中。建立PIA的目標(biāo)是識別應(yīng)用程序關(guān)于隱私和數(shù)據(jù)保護(hù)的影響,以確定是否該公司已采取適當(dāng)?shù)募夹g(shù)和組織措施以確保相應(yīng)的保護(hù),對計量檢定文件實施適當(dāng)?shù)谋Wo(hù),作為一個PIA的應(yīng)用程序,在部署前向主管機關(guān)提交報告的依據(jù)。據(jù)推測,該框架應(yīng)成為以決定一個通用結(jié)構(gòu)和內(nèi)容的報告。特別地,RFID關(guān)于應(yīng)用程序描述和范疇,RFID的應(yīng)用管理實踐、問責(zé)制分析和解決,有重要意義。此外,運營商要求對個人數(shù)據(jù)和隱私保護(hù)應(yīng)用程序的執(zhí)行進(jìn)行評估,并采取適當(dāng)?shù)募夹g(shù)和組織措施,以確保個人資料和隱私的保護(hù)(第5號),和指定一個人在企業(yè)中技術(shù)和組織的評估和審查措施的持續(xù)適宜性。此外,請各會員國支持歐盟委員會在確定這些應(yīng)用程序可能引發(fā)廣大市民信息安全威脅的影響(第6號)。建議在使用RFID時關(guān)注關(guān)于信息和透明度上的其他規(guī)定,在零售貿(mào)易中使用RFID的應(yīng)用時,要提高對行動的認(rèn)識,研究和發(fā)展后續(xù)行動(第7-18)。
根據(jù)歐洲在其特定通訊的議會,理事會,歐洲經(jīng)濟和社會委員會和地區(qū)委員會在物聯(lián)網(wǎng)(歐洲)的行動計劃,歐盟委員會再次指出,物聯(lián)網(wǎng)框架的安全性和保密性的重要性。特別是行動2線包括連續(xù)監(jiān)測隱私和個人數(shù)據(jù)保護(hù)問題;歐盟委員會設(shè)想行動3線的一部分用來開展高科技技術(shù)和法律方面“沉默權(quán)芯片”的辯論,并提出在任何時候的網(wǎng)絡(luò)環(huán)境中能夠讓其斷開的想法。
3、在法律框架方面的里程碑
物聯(lián)網(wǎng)體系結(jié)構(gòu)和RFID使用的實施構(gòu)成了法律上的挑戰(zhàn);議程的基本問題可以表述為如下:
是否需要國家法律(國際或國內(nèi))或市場法規(guī)有關(guān)業(yè)務(wù)的肯定?
如果設(shè)想要立法:現(xiàn)有的/傳統(tǒng)的法律是可以用的或新的法律是否有必要制定?
如果新的法律將被制定:哪一種法律是必需的,其實施在何時進(jìn)行? 這些法律上的挑戰(zhàn)需要被嵌入到人權(quán)和憲法框架。2008年2月27日關(guān)于德國最高法院決定,關(guān)于基本的獨立的機密性和完整性相關(guān)的信息技術(shù)系統(tǒng)值得關(guān)注。
3.1系統(tǒng)的方法
適當(dāng)?shù)姆煽蚣艿慕⒑蛯嵤┮笥嘘P(guān)立法進(jìn)程的系統(tǒng)方法。因此,應(yīng)從以下幾個方面加以考慮:
系統(tǒng)地發(fā)展RFID的使用狀況;只有在充分了解事實的情況下,才可以起草適當(dāng)?shù)姆梢?guī)定。
法律問題的系統(tǒng)化通過協(xié)調(diào)正沿著下面討論四個技術(shù)軸,即全球性、垂直度、普遍性和城市技術(shù)潛在的發(fā)生。
有關(guān)物聯(lián)網(wǎng)和RFID的安全和隱私問題的法律挑戰(zhàn)是在質(zhì)量上予以分類的。特別是,在提高安全性的時候,社會公民有多少隱私正在被侵犯,是必須解決的問題。應(yīng)尋找解決方案,使隱私和安全的研究不是作為對立的,而是互相影響的原則。
在多方面的事實情況下,這似乎是不可能的在物聯(lián)網(wǎng)和RFID的各個方面來一個統(tǒng)一的法律框架的。此外,要加以考慮方法的不平衡和差異化。因此,沿軸線集中的技術(shù)環(huán)境,是建立調(diào)控最重要的挑戰(zhàn):
基于事實的全球性,可以在全球范圍內(nèi)銷售和分布物聯(lián)網(wǎng)方面的商品和服務(wù)。基于RFID是“全球”技術(shù)的意義上,相同的技術(shù)工藝可以被應(yīng)用在世界各地。因此,將會在各國不同的法律下進(jìn)行大量復(fù)雜的商業(yè)和貿(mào)易。如果RFID標(biāo)簽的產(chǎn)品可在全球范圍內(nèi)流通,則需要同步法律體系。
垂直度指技術(shù)環(huán)境耐久性的潛力。特別地,它是物聯(lián)網(wǎng)重要的生命,不僅在供應(yīng)鏈中使用RFID標(biāo)簽,而且產(chǎn)品要在最終客戶要長時間的使用,比如在廢物管理方面。就目前而言,這一要求并不充分滿足EPC交通。普遍性指的是RFID標(biāo)簽環(huán) 境的范圍;從技術(shù)上來說,RFID確實可以被用來無處不在包羅萬象。
城市技術(shù)是一個以保護(hù)隱私為目標(biāo)的重要基礎(chǔ)規(guī)則的發(fā)展。可以考慮劃分幾個分區(qū),即(i)復(fù)雜性的標(biāo)簽(主動和被動的,可重寫的,處理和傳感器提供的產(chǎn)品),(ⅱ)復(fù)雜的后臺設(shè)備(閱讀器或其它鏈接的媒體)和特別設(shè)計的最大讀數(shù)范圍透明度的覆蓋要求。
建立法律框架約束所有物聯(lián)網(wǎng)的參與者時,必須考慮這四個方面的要求。由于這四個方面的要求,要建立的框架必須是全球性的,即被國際立法者建立的一個適用于地球上的每一個對象,直至其被破壞。普遍性問題需要加以解決,特別是把不同的對象放在一起形成一個新的“東西”。
這個新的“東西”可以歸結(jié)為一個新的標(biāo)簽,或創(chuàng)建可攜帶多個的標(biāo)簽。雖然第一種情況是比較實用的,該解決方案可將企業(yè)的各個部分問題追溯到其起源。該解決方案可以把所有的不同來源各個部分的信息附加到對象的一個標(biāo)簽上。需要找到一個普遍適用的全球性共識。對于城市技術(shù)提出的問題也被要求四個方面。如果組成的對象保持所有標(biāo)簽的綜合部分,追查有關(guān)該對象的所有相關(guān)信息變得非常復(fù)雜和困難的。正如本文所述,確定一個適當(dāng)?shù)姆煽蚣芤鉀Q各種技術(shù)問題。因此,在這個過程中列入技術(shù)專家似乎是不可避免的。此外,討論還表明,需要建立國際層面上的框架并處理所有基本問題。否則,該物聯(lián)網(wǎng)變得不切實際并不能被有效地使用。
從上述系統(tǒng)化的方法可以得出關(guān)于立法的一個潛在結(jié)論:一個獨特的戰(zhàn)略將不能做到令人滿意的物聯(lián)網(wǎng)隱私挑戰(zhàn)。不可避免的是,立法者必須用好幾個方法。特別是,城市技術(shù)方面的考慮也是非常重要的。此外,數(shù)據(jù)保護(hù)和隱私需要建立一個有效的溝通策劃平臺,為州議員、非政府組織、公眾利益團體和國際私營部門之間的對話。
3.2國家法律或自我調(diào)節(jié)
為物聯(lián)網(wǎng)在安全性和隱私保護(hù)方面建立適當(dāng)?shù)姆煽蚣埽瑥亩鉀Q相應(yīng)的合法來源問題。在理論上屬于不同的監(jiān)管模式:主要是在傳統(tǒng)的國家規(guī)定,國際協(xié)定和自我調(diào)節(jié)中選擇,在沒有任何調(diào)節(jié)的可能的情況下,這不能被視為一個真正的“解決方案”。如前所述,國家調(diào)節(jié)的缺點是不符合全球化的事實,通過物聯(lián)網(wǎng)的交易通常是具有跨國界性質(zhì),所以需要一個適當(dāng)?shù)姆煽蚣堋?/p>
(一)到目前為止,在物聯(lián)網(wǎng)監(jiān)管模式的基礎(chǔ)上從技術(shù)準(zhǔn)則和公平信息的做法自我規(guī)管的企業(yè)標(biāo)準(zhǔn)。特別是EPC-指引依賴的組件,如“消費者注意事項”,“消費者教育和“持有和IT安全政策”。因此,符合EPC指南要有一個自我控制的策略。這種自我監(jiān)管模式遵循著名的輔助性原則,這意味著一個特定的社會參與者在沒有政府干預(yù)的情況下,試圖找到合適的解決方案(結(jié)構(gòu),行為)。自我調(diào)節(jié)的合法性是基于個人的積極性制定規(guī)則的過程。此外,自律比國家法律成本更低,更靈活。原則上,自我調(diào)節(jié)是有道理的,它比國家法律更有效并且自我調(diào)節(jié)比遵守社會規(guī)則更符合。
自我規(guī)管模式的理論方法有很多場景:在許多情況下,自我調(diào)節(jié)不超過一個概念,一個民間團體,即是在政府(指導(dǎo)性的法規(guī)或經(jīng)審核的自我調(diào)節(jié)能力)的框架內(nèi)發(fā)生的一個概念。在過去的十年中,這種方法已產(chǎn)生了重要的作用:若政府提供一個總體框架,往往可以由私營部門長期的“共同調(diào)控”。州議員不只是制定法律的標(biāo)準(zhǔn),或一些一般性法律框架的支柱,最終也是政府參與自我監(jiān)管措施,至少是在對監(jiān)控目標(biāo)的進(jìn)展和成效方面的舉措。
在這種情況下,法律學(xué)說發(fā)展的“軟法律”概念表達(dá)不僅僅是對私下承諾的政策聲,雖低于嚴(yán)格意義上的法律,但也接近一定的法律,擁有一定的法律意義。然而,短期的“軟法律”也尚未有明確的范圍或可靠的內(nèi)容。特別是在規(guī)則的可執(zhí)行性方面,法律不是有效(“硬法”)就是不生效(“沒有法律”),這意味著它很難區(qū)分不同程度的法律效力。一般情況下,只能說軟法是一種社會概念密切的法律,它通常包括某種形式的期望和可接受的行為準(zhǔn)則。如果不是自愿這樣做,這個自我調(diào)節(jié)的概念不能克服執(zhí)法策略的不足。因此,立法者的參與似乎是不可避免的。
在過去幾年里自我調(diào)節(jié)的重要性已經(jīng)獲得了認(rèn)可,但仍然有批評者指出,自律機制只規(guī)管那些參加者的積極性和原則性,市場壓力尚未強大到足以迫使每個人都采用相關(guān)規(guī)則。此外,只有通過自我調(diào)節(jié)利益相關(guān)者來滿足自己的利益,不是有效的隱私保護(hù)。
(二)因此,即使自我調(diào)節(jié)可以兌現(xiàn)多方面的優(yōu)點,法律框架背景下安全和隱私的一些支柱也需要設(shè)置立法者。這些法律都必須在國際上推出。當(dāng)代國際法往往承認(rèn)一個廣泛國際法方面理論的定義,根據(jù)該領(lǐng)域不再僅局限于民族國家之間的關(guān)系的,但接受其他國際成員,比如人類個體、國際組織和法人實體的作用日益重要。由于在一個快速發(fā)展的領(lǐng)域習(xí)慣規(guī)則很難,如物聯(lián)網(wǎng)發(fā)展的主要法律來源表現(xiàn)在法律的一般原則,如良好的意愿、平等相待、在經(jīng)營活動中的公平性、法律效力的協(xié)議等。這些一般原則可以說明“大量的規(guī)則是抽象出來的”,所以“不再直接與國家慣例相連而且被很長時間普遍接受”。在一定程度上,“自然法”被認(rèn)為是基本的法律原則;實際上,一般的法律原則是如此基本,幾乎所有的法律制度都可以找到他們。
具體問題的安全性和保密性。由于在世界不同的地區(qū)看待隱私問題的一般原則是不相同的,這使得應(yīng)用程序在跨境業(yè)務(wù)活動十分困難。因此,一個基本的法律框架應(yīng)引入國際立法者,然而,保護(hù)安全及隱私需求的詳細(xì)法律規(guī)則由私營部門開發(fā)。
物聯(lián)網(wǎng)本身是一個新的系統(tǒng),它的立法和執(zhí)政委托一個機構(gòu)進(jìn)行,是新的想法,并不牽強。一個新機構(gòu)要考慮到物聯(lián)網(wǎng)所在地位的所有特點。此外,考慮到物聯(lián)網(wǎng)的復(fù)雜性,這個機構(gòu)可以在某種程度上擁有處理問題所必要的能力。另一種方法是創(chuàng)建一個新的整合國際立法者任務(wù)的機構(gòu),為物聯(lián)網(wǎng)現(xiàn)有的組織??紤]到物聯(lián)網(wǎng)的全球性,該組織有一定的領(lǐng)土適用范圍。此外,該組織應(yīng)該有一個只負(fù)責(zé)物聯(lián)網(wǎng)的機構(gòu)。最后,物聯(lián)網(wǎng)的立法和管理應(yīng)包含被委任組織的解雇。在考慮這些要求的時候,會想到世界貿(mào)易組織(WTO)和經(jīng)濟合作與發(fā)展組織(OECD)??梢栽O(shè)立一個特別委員會,作為國際立法者問題的答案,負(fù)責(zé)物聯(lián)網(wǎng)的制定規(guī)則和監(jiān)督。該委員會由世界貿(mào)易組織和經(jīng)濟合作與發(fā)展組織成員國的代表組成,從而確保國際態(tài)度。委員會經(jīng)商議后,發(fā)出正式的協(xié)議、標(biāo)準(zhǔn)和模式,建議或指引物聯(lián)網(wǎng)的各種問題。
在該領(lǐng)域的經(jīng)驗和在互聯(lián)網(wǎng)治理方面的評價不謀而合。由于尚不存在具有國際約束力的涵蓋隱私和數(shù)據(jù)保護(hù)的協(xié)議。即使隱私是國際人權(quán)文書的本質(zhì)體現(xiàn),保護(hù)在一定程度上也是不夠的;只有“極端”的法律保障,如尊重私人生活或避免隨意暴露或非法干涉。因此,共同監(jiān)管是必要的,它已被廣泛接受,以確保在網(wǎng)絡(luò)世界中的隱私可以實施有效的原則。自我規(guī)管制度的要素包括按照行為代碼的規(guī)則實施最佳做法,按照實質(zhì)性的保障資料原則,建立內(nèi)部控制程序(遵照規(guī)則),設(shè)置熱線電話公開的處理投訴,透明的數(shù)據(jù)保護(hù)政策。如經(jīng)濟合作與發(fā)展組織和藝術(shù)指導(dǎo)方針等許多國際文書。EC管理中關(guān)于保護(hù)個人資料(1995年)的27條,提及自律也是適當(dāng)?shù)墓ぞ摺?/p>
然而,安全和隱私的保護(hù)不完全是由立法者要解決的問題。在信息技術(shù)領(lǐng)域的研發(fā)也應(yīng)考慮新發(fā)明的道德后果。
3.3法律分類和方案
未來涵蓋物聯(lián)網(wǎng)和RFID的隱私和數(shù)據(jù)保護(hù)問題的立法可能有五種不同的目標(biāo):
指引性立法; 禁止性立法; IT安全立法; 應(yīng)用性立法; 目的性立法。
在未來制定不同類別的法律應(yīng)以隱私和個人數(shù)據(jù)保護(hù)的目標(biāo)評估,這取決于使用RFID可涉及到的以下幾個方面,即: 產(chǎn)品監(jiān)控(EPC);
動物監(jiān)測(實時驗證和監(jiān)測動物); 人員監(jiān)測(實時驗證和監(jiān)控人員); 收集分析的數(shù)據(jù)(搜集)。
物聯(lián)網(wǎng)的背景下,有關(guān)產(chǎn)品的EPC方案幾乎是最重要的應(yīng)用。從理論上講,EPC和個人數(shù)據(jù)并沒有直接的跟蹤關(guān)系。然而,一個帶著RFID標(biāo)簽的人會給使用RFID系統(tǒng)的組織透漏某些數(shù)據(jù)或收集一些信息。
具體的立法會涉及術(shù)語“人”的方面。歐盟的法規(guī)以及許多國家的法律,只考慮個人隱私保護(hù)法的對象(“自然人”)。特別地,在物聯(lián)網(wǎng)的范圍內(nèi),這種認(rèn)識太過于狹窄。法律人士(如公司)也有這樣的隱私利益;例如瑞士的立法,把數(shù)據(jù)保護(hù)法的應(yīng)用范圍擴大到了法人。
(一)指引性立法的宗旨,讓顧客了解RFID方案的應(yīng)用。換句話說,客戶應(yīng)知道哪些數(shù)據(jù)被收集并也應(yīng)該在購買后有停用標(biāo)簽的能力。在美國,曾多次努力實現(xiàn)這樣的立法。
(二)禁止性立法引入了預(yù)期禁止或限制在某些情況下使用RFID的規(guī)定。如果社會公眾不喜歡某種行為,執(zhí)行禁止性立法這種做法在傳統(tǒng)國家是可能的(至少在書上)。自我監(jiān)管的機制,傾向于引入激勵機制(如果有的話),而不是禁止。
(三)IT安全立法包括要求建立一定的IT安全保護(hù)標(biāo)準(zhǔn),應(yīng)該保護(hù)RFID應(yīng)用的未經(jīng)授權(quán)的讀取和重寫。這種規(guī)定可以通過自律機制引入國家立法者,而且通常情況下,有關(guān)市場參與者會制定行業(yè)標(biāo)準(zhǔn),因此有機會觀察到各自的開發(fā)商。從技術(shù)上說,一個可以設(shè)置嚴(yán)格保障措施和頻繁報告、審計措施的“第四代”數(shù)據(jù)保護(hù)協(xié)議的新框架應(yīng)當(dāng)制定。
(四)應(yīng)用性立法計劃在某些情況下以支持RFID的使用。在這種做法違反了禁止性立法時,它設(shè)想RFID提供的有關(guān)證明文件。因此,立法的方法有微調(diào)禁止和應(yīng)用方法之間的適當(dāng)平衡。
(五)目的性立法包括法律規(guī)定,加強RFID技術(shù)在法律挑戰(zhàn)研究的社會投入;這種做法的目的在于更好地了解有關(guān)問題。
3.4對歐洲立法方式的評價
2009年5月12日,歐盟委員會建議,在互聯(lián)網(wǎng)安全領(lǐng)域,以一個框架的方式立法。本建議為各成員國制定具體的規(guī)則提供了指導(dǎo)。而建議參考的歐盟數(shù)據(jù)保護(hù)指令,它本身并沒有規(guī)定任何具體的條文。此外,歐盟委員會還引入了一個隱私和影響評估框架,由業(yè)界和有關(guān)的民間社會的利益相關(guān)者建立,確保各成員國發(fā)布信息政策的應(yīng)用。全球的EPC行業(yè)正在建立要求建立的框架(私人影響評估,PIA)。即使在2009年11月初也不知道其詳細(xì)信息,可以說PIA的目標(biāo)旨在確定對隱私和數(shù)據(jù)保護(hù)的影響,確定該公司是否已經(jīng)采取了適當(dāng)?shù)募夹g(shù)和組織措施,以確保各自的保護(hù),記錄實施的措施,并作為一個PIA的基礎(chǔ)向主管機關(guān)報告。涉及RFID的應(yīng)用有許多重要的描述和范圍,RFID應(yīng)用的治國實踐,問責(zé)制的挑戰(zhàn),以及分析和解決方面。最后,成員國強烈鼓勵支持該歐盟委員會提供的這個對信息安全威脅識別的框架。
歐盟委員會的監(jiān)管模式,由模糊的框架指引,涉及許多不考慮自我監(jiān)管模式和行業(yè)標(biāo)準(zhǔn)化優(yōu)劣的方面。該框架以開放的方式被配制,從而確保技術(shù)原理如垂直度,普遍性和城市技術(shù)等可以實施。然而,由歐盟委員會正在建立的措施,它只適用于在歐洲的成員國,而不是全球。此外,在事實上,它詳細(xì)的規(guī)定是應(yīng)成員國要求建立的,更是損害了全球性的原則。
然而,歐盟委員會最近提出的建議和溝通證明,在物聯(lián)網(wǎng)領(lǐng)域的隱私和數(shù)據(jù)保護(hù)問題得到了重視,并對于建立機制有堅強的意志,以確保一旦物聯(lián)網(wǎng)大規(guī)模經(jīng)營業(yè)務(wù)那些保證的準(zhǔn)確性。
4、前景
物聯(lián)網(wǎng)的興起,為確保其保密性和安全性而實行新的監(jiān)管辦法以成為必要。特別是,截獲攻擊,數(shù)據(jù)身份驗證,訪問控制和保證客戶的隱私(自然人和法人)。物聯(lián)網(wǎng)的本質(zhì)要求有異質(zhì)性和差異化的法律框架,充分考慮物聯(lián)網(wǎng)的全球性、垂直度、普遍性和城市技術(shù)。
在這種情況下,國家對于地域限制的立法似乎并不合適。然而,到現(xiàn)在為止已被應(yīng)用的自我調(diào)節(jié)機制可能不足以確保有效的隱私和安全。因此,由國際層面上的立法者制定實質(zhì)性的框架為主要原則,私營部門提供補充更詳細(xì)的規(guī)定,似乎是最好的解決方案。通過這樣一個框架,可滿足每個人一般的要求,然后加以補充的方式來適合有關(guān)人士目前的需求。此外,被列入的國際立法者在這個過程中也確保了公共部門繼續(xù)參與,至少有助于監(jiān)測過程。
向歐洲委員會選擇的那個方向發(fā)展。這將是有國際(歐洲)立法者設(shè)定的最好框架;這種方法能更好地適應(yīng)全球性物聯(lián)網(wǎng)所帶來的需求。此外,可以由私營部門建立更詳細(xì)的規(guī)定,私營部門已經(jīng)把從互聯(lián)網(wǎng)治理得出的一般經(jīng)驗教訓(xùn)標(biāo)記在制定的規(guī)則里。
有關(guān)法例的內(nèi)容,包括獲得信息的權(quán)利,禁止或限制使用物聯(lián)網(wǎng)的規(guī)定,對IT安全立法的機制,物聯(lián)網(wǎng)機制配套使用的規(guī)定,并建立一個工作小組進(jìn)行物聯(lián)網(wǎng)法律挑戰(zhàn)的研究。
而機制仍然需要發(fā)展,通過最終問題和建議的早期認(rèn)識,希望在物聯(lián)網(wǎng)全面運作之前,可以為他們的遭遇建立有效的監(jiān)管。
羅爾夫·H·韋伯博士,教授(rolf.weber@ rwi.uzh.ch)是蘇黎世大學(xué)的教授和香港大學(xué)的客座教授。
羅爾夫·H.·韋伯曾在蘇黎世大學(xué)和哈佛大學(xué)法學(xué)院學(xué)習(xí)。自1995年以來,他是蘇黎世大學(xué)的講座教授,自2006年以來香港大學(xué)的客座教授,教學(xué)和出版了在民事、商事和歐洲法律與互聯(lián)網(wǎng),媒體和競爭法、國際金融和貿(mào)易監(jiān)管的專題。他是歐洲法律研究中心和蘇黎世大學(xué)信息與通信法律中心的主任;此外,他的研究生課程是國際商業(yè)法及蘇黎世大學(xué)的MBA項目中的一員。自2008年以來,羅爾夫·H·韋伯博士,教授是全球互聯(lián)網(wǎng)治理學(xué)術(shù)網(wǎng)絡(luò)(你好)督導(dǎo)委員會成員,自2009年他成為信息和通信技術(shù)與發(fā)展(GAID)全球聯(lián)盟高級別小組顧問的成員。此外,他所從事的是法律律師和幾個瑞士和國際法律期刊的編輯委員會成員。這方面的第一個貢獻(xiàn)是在西爾維亞·克爾凱郭爾出版的《網(wǎng)絡(luò)法律和貿(mào)易的法律論述》(主編),2009年1月14日。作者感謝酒精。感謝羅馬納·韋伯為她研究價值的支持。
第三篇:物聯(lián)網(wǎng)帶來的挑戰(zhàn)與新機遇
物聯(lián)網(wǎng)帶來的挑戰(zhàn)與新機遇
伴隨人們身邊越來越多的連網(wǎng)設(shè)備,物聯(lián)網(wǎng)(Internet of Things,IoT)似乎離我們也越來越近了。事實上,它已在很多產(chǎn)業(yè)里經(jīng)歷了多年的演變和發(fā)展。因此我們經(jīng)常會在不同行業(yè)的現(xiàn)有應(yīng)用中看到“智能”二字,這其實就是物聯(lián)網(wǎng)的一些應(yīng)用實例,比如“智能房屋”,“智能城市”等。
物聯(lián)網(wǎng)帶來的新機遇
現(xiàn)在,物聯(lián)網(wǎng)被很多人看成是繼移動網(wǎng)絡(luò)之后的又一大機遇,從理論層面來看,物聯(lián)網(wǎng)是機器和設(shè)備間的互聯(lián)網(wǎng)絡(luò)。物聯(lián)網(wǎng)是一個針對特定需求,將人、物、數(shù)據(jù)和流程整合在一起的網(wǎng)絡(luò),其中每一部分都可以智能地連接到互聯(lián)網(wǎng)全網(wǎng)或部分網(wǎng)絡(luò)上。物聯(lián)網(wǎng)的目標(biāo)則是實現(xiàn)人與人互動、人機互動、機器之間的互動,來提升人們的交流效率,讓生活變得更加豐富多彩。
因此,在物聯(lián)網(wǎng)中,與互聯(lián)網(wǎng)相連接的“物”可以是健身手環(huán),可以是冰箱,也可以是汽車,所以有廠商更推出 “萬聯(lián)網(wǎng)”(Internet of Everything)的概念,即連接所有的設(shè)備、器件。作為物聯(lián)網(wǎng)概念的巧妙擴展,萬聯(lián)網(wǎng)可以通過數(shù)據(jù)和指令的形式實現(xiàn)人與機器的智能鏈接。
但總的來說,物聯(lián)網(wǎng)和萬聯(lián)網(wǎng)都旨在達(dá)成設(shè)備(包括人在內(nèi))間的相互連通,實現(xiàn)以往無法實現(xiàn)的功能。例如,當(dāng)一個人在休息時卻心率過高,便會有設(shè)備進(jìn)行報警提示;或根據(jù)個人對于室溫的喜好,設(shè)備能夠在使用者進(jìn)入房間前可以進(jìn)行自動調(diào)整等等。
不僅如此,基于物聯(lián)網(wǎng)的許多智能化應(yīng)用也在推進(jìn)中。以“智能貨運物流”為例,通過對相互連通的車輛進(jìn)行統(tǒng)一管理,來改善調(diào)配時間、油料消耗等等。目前,聯(lián)邦快遞和UPS都已采取了這種做法。而沃爾瑪和塔基特百貨也在利用同樣的技術(shù)來對不同位置的存貨進(jìn)行管理。
那么這場變革現(xiàn)今是處于啟蒙階段,亦或已在進(jìn)行,還是更應(yīng)被視為一種未來的發(fā)展趨勢?對于企業(yè)而言,這又將帶來怎樣的挑戰(zhàn)呢?
物聯(lián)網(wǎng)帶來的挑戰(zhàn)
需要看到的是,物聯(lián)網(wǎng)的前進(jìn)之路也并非一馬平川。
首先,設(shè)備間的協(xié)同性和統(tǒng)一連接層的缺失就是無法忽視的重要問題。目前許多設(shè)備使用著不同的通訊協(xié)議,而有些設(shè)備可能根本沒有完整的TCP/IP堆棧(這并不能算作壞事,技術(shù)專家只是不想讓智能燈泡這樣的東西也存在漏洞)。以AllSeen Alliance、Open InterConnect Consortium及Thread Group為代表的一些組織都試圖在協(xié)同性這個問題上建立統(tǒng)一的標(biāo)準(zhǔn)。但即便某個行業(yè)設(shè)定了一定的標(biāo)準(zhǔn),復(fù)雜多變的實施過程也不能保證不同設(shè)備之間的兼容性 和正常通訊。當(dāng)前,企業(yè)仍需建立自己的轉(zhuǎn)譯層來保證設(shè)備間的協(xié)同性。
第二個挑戰(zhàn)在于數(shù)據(jù)的流入規(guī)模,這涉及到數(shù)據(jù)收集、采集和分析等多方面問題。許多用例要求通過接入設(shè)備采集包括實時監(jiān)控和歷史記錄在內(nèi)的相當(dāng)數(shù)量的數(shù)據(jù)。當(dāng)今多數(shù)基礎(chǔ)設(shè)施都能夠擴大從數(shù)據(jù)中心到設(shè)備的流出數(shù)據(jù)規(guī)模,但從設(shè)備進(jìn)入數(shù)據(jù)中心就會變得非常困難。除此之外,當(dāng)企業(yè)收集到的數(shù)據(jù)達(dá)到PB級別時,存儲就成為了下一個難題。綜上所述,企業(yè)必須找到最佳方案來管理從設(shè)備上收集到的數(shù)據(jù),而且還要擁有相應(yīng)的工具,保證這些數(shù)據(jù)在有效時間內(nèi)發(fā)揮其應(yīng)有的作用。
缺乏能夠避開數(shù)據(jù)中心,在設(shè)備間直接實現(xiàn)信息和指令實時傳遞的中介是第三個挑戰(zhàn)。當(dāng)然,根據(jù)不同情況,數(shù)據(jù)中心同樣不失為一種可靠選擇。但隨著設(shè)備的不斷增多,數(shù)據(jù)中心進(jìn)出口的瓶頸會造成延遲和其他問題。
讓大家普遍最為頭痛的第四個挑戰(zhàn)便是安全問題。針對互聯(lián)網(wǎng)和不同的接入設(shè)備,我們已看到一些覆蓋范圍廣、效果驚人的攻擊。試想一下,無論家用或企業(yè)級的互聯(lián)設(shè)備,如接入互聯(lián)網(wǎng)的交通指示燈,恒溫器,或醫(yī)用監(jiān)控設(shè)備遭到攻擊,后果都將非??膳隆?/p>
盡管物聯(lián)網(wǎng)的最終實現(xiàn)仍面臨著各種問題,但通過智能化接入設(shè)備的使用和普及,企業(yè)和個人不斷完善的能力正快速推進(jìn)著物聯(lián)網(wǎng)的發(fā)展。
第四篇:物聯(lián)網(wǎng)技術(shù)及其工業(yè)應(yīng)用的機遇與挑戰(zhàn)
物聯(lián)網(wǎng)技術(shù)及其工業(yè)應(yīng)用的機遇與挑戰(zhàn)
摘要:當(dāng)代物聯(lián)網(wǎng)技術(shù)發(fā)展迅速,尤其在工業(yè)中的應(yīng)用越發(fā)值得研究和關(guān)注。本文將簡析物聯(lián)網(wǎng)歷史和關(guān)鍵技術(shù),分析其在工業(yè)中的應(yīng)用以及由此帶來的機遇與挑戰(zhàn),為我們?yōu)榱税l(fā)展物聯(lián)網(wǎng)事業(yè),迎接物聯(lián)網(wǎng)時代指明方向。
關(guān)鍵詞:物聯(lián)網(wǎng)技術(shù)(IOT),工業(yè)應(yīng)用,信息,網(wǎng)絡(luò),無線網(wǎng)(WSNs)。
Abstract: the Internet of things technology developed rapidly,and in its application in industry is especially worthy of our attention and research.In this paper,the history of the Internet of things, its key technology , its application in industry which results in many opportunities and challenges to us,will be analyzed , so that we can greatly meet the development of the Internet of things industry and pick up the direction of the era of the Internet of things.Keywords:technology of IOT, industrial applications, information,Internet,Wireless Sensor Networks.物聯(lián)網(wǎng)內(nèi)涵的詮釋以及其歷史
物聯(lián)網(wǎng)是繼計算機與互聯(lián)網(wǎng)技術(shù)之后,掀起世界信息產(chǎn)業(yè)風(fēng)暴的關(guān)鍵技術(shù)。
物聯(lián)網(wǎng)是在互聯(lián)網(wǎng)基礎(chǔ)上,將用戶端擴展到了任何物品與物品之間,進(jìn)行信息交換和通信,它的出現(xiàn)最早可追溯到1990年第一次出現(xiàn)的最初實踐原型——施樂網(wǎng)絡(luò)可樂販?zhǔn)蹤C(Networked Coke Machine)。1999 年,在美國召開的移動計算和網(wǎng)絡(luò)國際會議上,物聯(lián)網(wǎng)被定義為:物與物進(jìn)行互聯(lián)通信的網(wǎng)絡(luò),其英文名稱是“Internet of Things, IoT”。
在如今全球經(jīng)濟的快速發(fā)展的促進(jìn)下,世界各國為謀求更多的經(jīng)濟利益,而近些年電子標(biāo)簽、嵌入式系統(tǒng)和中間件系統(tǒng)以及云計算等技術(shù)的日益發(fā)展完善,物聯(lián)網(wǎng)的發(fā)展壯大將是不可估量的。
2物聯(lián)網(wǎng)的體系架構(gòu)
物聯(lián)網(wǎng)是互聯(lián)網(wǎng)向物理世界的延伸和拓展,互聯(lián)網(wǎng)可以作為傳輸物聯(lián)網(wǎng)信息的重要途徑之一,而傳感器網(wǎng)絡(luò)基于自組織網(wǎng)絡(luò)方式,屬于物聯(lián)網(wǎng)中一類重要的感知技術(shù)。從技術(shù)架構(gòu)上分析,物聯(lián)網(wǎng)可分為感知層、網(wǎng)絡(luò)層和內(nèi)容應(yīng)用層。
感知層的石油溫度傳感器、濕度傳感器、二氧化碳濃度傳感器、二維碼標(biāo)簽等傳感器或和傳感器網(wǎng)構(gòu)成的感知終端,其基本作用是感知,是物聯(lián)網(wǎng)收集信息的執(zhí)行者,也是物聯(lián)網(wǎng)識別物體、采集信息的來源。
網(wǎng)絡(luò)層顧名思義就是物聯(lián)網(wǎng)的網(wǎng)絡(luò)部分,負(fù)責(zé)傳遞和處理感知層獲取的信息,將信息上傳或者傳遞,是由互聯(lián)網(wǎng)、各種私有網(wǎng)絡(luò)、云計算平臺和網(wǎng)絡(luò)管理系統(tǒng)等組成的。
應(yīng)用層是物聯(lián)網(wǎng)同用戶(包括人、組織和其他系統(tǒng))的接口,它與行業(yè)需求結(jié)合,處理各種用戶需求,實現(xiàn)物聯(lián)網(wǎng)的智能應(yīng)用。
3物聯(lián)網(wǎng)的關(guān)鍵技術(shù)
物聯(lián)網(wǎng)是一種網(wǎng)絡(luò),就應(yīng)該具有網(wǎng)絡(luò)的一些特性。由網(wǎng)絡(luò)理論中分層的概念分析概括,現(xiàn)階段的物聯(lián)網(wǎng)大致可以分成以下幾個部分。
可見物聯(lián)網(wǎng)是一個相當(dāng)龐大的集合,囊括了因特網(wǎng)、EPC/RFID、傳感器、嵌入式系統(tǒng)、無線組網(wǎng)等各行業(yè)的成熟技術(shù)。
ITU在2005年的物聯(lián)網(wǎng)報告中重點描述了物聯(lián)網(wǎng)的4個關(guān)鍵性應(yīng)用技術(shù)——標(biāo)簽事物的RFID技術(shù)、感知事物的傳感器技術(shù)、思考事物的智能技術(shù)、微縮事物的納米技術(shù)各項技術(shù),它們雖然發(fā)展不統(tǒng)一,其中相輔相成,其中射頻標(biāo)簽、條碼與二維碼等技術(shù)已經(jīng)非常成熟,傳感器網(wǎng)絡(luò)相關(guān)技術(shù)尚有很大發(fā)展空間。
3.1 感知和標(biāo)識技術(shù)
感知和標(biāo)識技術(shù)是物聯(lián)網(wǎng)的基礎(chǔ),主要應(yīng)用與物聯(lián)網(wǎng)感知層,其主要作用是采集物理世界中發(fā)生的物理事件和數(shù)據(jù),實現(xiàn)外部世界信息的感知和識別,主要包括多種發(fā)展成熟度差異性很大的技術(shù),如傳感器、RFID、二維碼等。傳感技術(shù)利用傳感器和多跳自組織傳感器網(wǎng)絡(luò),協(xié)作感知、采集網(wǎng)絡(luò)覆蓋區(qū)域中被感知對象的信息。識別技術(shù)涵蓋物體識別、位置識別和地理識別,對物理世界的識別是實現(xiàn)全面感知的基礎(chǔ)。物聯(lián)網(wǎng)標(biāo)識技術(shù)是以二維碼、RFID標(biāo)識為基礎(chǔ)的,對象標(biāo)識體系是物聯(lián)網(wǎng)的一個重要技術(shù)點。
3.2 網(wǎng)絡(luò)技術(shù)
物聯(lián)網(wǎng)是網(wǎng)絡(luò)的一種,因此網(wǎng)絡(luò)是物聯(lián)網(wǎng)信息傳遞和服務(wù)支撐的基礎(chǔ)設(shè)施,通過泛在的互聯(lián)功能,實現(xiàn)感知信息高可靠性、高安全性傳送。網(wǎng)絡(luò)技術(shù)的關(guān)鍵技術(shù)包括接入與組網(wǎng)、通信與頻管。物聯(lián)網(wǎng)的網(wǎng)絡(luò)技術(shù)涵蓋泛在接入和骨干傳輸?shù)榷鄠€層面的內(nèi)容。以互聯(lián)網(wǎng)協(xié)議版本6(IPv6)為核心的下一代網(wǎng)絡(luò),為物聯(lián)網(wǎng)的發(fā)展創(chuàng)造了良好的基礎(chǔ)網(wǎng)條件。以傳感器網(wǎng)絡(luò)為代表的末梢網(wǎng)絡(luò)在規(guī)模化應(yīng)用后,面臨與骨干網(wǎng)絡(luò)的接人問題。
物聯(lián)網(wǎng)需要綜合各種有線及無線通信技術(shù),其中近距離無線通信技術(shù)將是物聯(lián)網(wǎng)的研究重點。為提升頻譜資源的利用率,讓更多物聯(lián)網(wǎng)業(yè)務(wù)能實現(xiàn)空間并存,需切實提高物聯(lián)網(wǎng)規(guī)?;瘧?yīng)用的頻譜保障能力,保證異種物聯(lián)網(wǎng)的共存,并實現(xiàn)其互聯(lián)互通互操作。
3.3計算與服務(wù)技術(shù)
計算與服務(wù)技術(shù)是物聯(lián)網(wǎng)應(yīng)用層的關(guān)鍵,海量感知信息的計算與處理是物聯(lián)網(wǎng)的核心支撐。服務(wù)和應(yīng)用則是物聯(lián)網(wǎng)的最終價值體現(xiàn),在這項技術(shù)中信息計算和服務(wù)計算是最重要的技術(shù)。
海量感知信息計算與處理技術(shù)是物聯(lián)網(wǎng)應(yīng)用大規(guī)模發(fā)展后,面臨的重大挑戰(zhàn)之一。需要研究海量感知信息的數(shù)據(jù)融合、高效存儲、語義集成、并行處理、知識發(fā)現(xiàn)和數(shù)據(jù)挖掘等關(guān)鍵技術(shù),而采用云計算技術(shù)實現(xiàn)信息存儲資源和計算能力的分布式共享,能為海量信息的高效利用提供支撐。物聯(lián)網(wǎng)不斷涌現(xiàn)的新型應(yīng)用將使物聯(lián)網(wǎng)的服務(wù)模式與應(yīng)用開發(fā)受到巨大挑戰(zhàn),從適應(yīng)未來應(yīng)用環(huán)境變化和服務(wù)模式變化的角度出發(fā),需要研究針對不同應(yīng)用需求的規(guī)范化、通用化服務(wù)體系結(jié)構(gòu)以及應(yīng)用支撐環(huán)境、面向服務(wù)的計算技術(shù)等。
3.4 管理與支撐技術(shù)
管理與支撐技術(shù)貫穿了物聯(lián)網(wǎng)所有層次,而隨著物聯(lián)網(wǎng)網(wǎng)絡(luò)規(guī)模的擴大、承載業(yè)務(wù)的多元化和服務(wù)質(zhì)量要求的提高以及影響網(wǎng)絡(luò)正常運行因素的增多,管理與支撐技術(shù)是保證物聯(lián)網(wǎng)實現(xiàn)“可運行,可管理,可控制”的關(guān)鍵,包括測量分析、網(wǎng)絡(luò)管理和安全保障等方面。測量分析是解決網(wǎng)絡(luò)可知性問題的基本方法,可測性是網(wǎng)絡(luò)研究中的基本問題。
隨著網(wǎng)絡(luò)復(fù)雜性的提高與新型業(yè)務(wù)的不斷涌現(xiàn),需研究高效的物聯(lián)網(wǎng)測量分析關(guān)鍵技術(shù),建立面向服務(wù)感知的物聯(lián)網(wǎng)測量機制與方法。安全是基于網(wǎng)絡(luò)的各種系統(tǒng)運行的重要基礎(chǔ)之一,物聯(lián)網(wǎng)的開放性、包容性和匿名性也決定了不可避免地存在信息安全隱患。需要研究物聯(lián)網(wǎng)安全關(guān)鍵技術(shù),滿足機密性、真實性、完整性、抗抵賴性的四大要求,同時還需解決好物聯(lián)網(wǎng)中的用戶隱私保護(hù)與信任管理問題。
3.4 無線傳感器網(wǎng)絡(luò)的發(fā)展
無線傳感器網(wǎng)絡(luò)(Wireless Sensor Networks, WSNs)是由部署在監(jiān)測區(qū)域內(nèi)大量傳感器節(jié)點相互通信形成的多跳自組織網(wǎng)絡(luò)系統(tǒng),是物聯(lián)網(wǎng)底層網(wǎng)絡(luò)的重要技術(shù)形式。隨著無線通信、傳感器技術(shù)、嵌入式應(yīng)用和微電子技術(shù)的日趨成熟,WSNs可以在任何時間、任何地點、任何環(huán)境條件下獲取人們所需信息,為物聯(lián)網(wǎng)的發(fā)展奠定基礎(chǔ)。
WSNs作為當(dāng)今信息科學(xué)與計算機網(wǎng)絡(luò)領(lǐng)域的研究熱點,其關(guān)鍵技術(shù)具有跨學(xué)科交叉、多技術(shù)融合等特點,每項關(guān)鍵技術(shù)都需要亟待突破。WSNs的關(guān)鍵技術(shù)主要體現(xiàn)在3個方面,即信息采集系統(tǒng)設(shè)計、網(wǎng)絡(luò)服務(wù)支持和網(wǎng)絡(luò)通信協(xié)議設(shè)計。
ABI Research公司分析預(yù)測,作為WSNs完成數(shù)據(jù)無線傳輸?shù)闹饕叹嚯x無線通信形式,IEEE 802.15.4 集成電路市場出貨量在未來將進(jìn)一步加大。現(xiàn)階段,面向物聯(lián)網(wǎng)的WSNs還處于研究的探索階段,在信息采集系統(tǒng)設(shè)計、網(wǎng)絡(luò)服務(wù)支持和網(wǎng)絡(luò)通信協(xié)議設(shè)計等方面都面臨一系列的挑戰(zhàn)。
未來的WSNs的發(fā)展方向,將是適應(yīng)人們的各種需求,充分利用物聯(lián)網(wǎng)的技術(shù)優(yōu)勢,建立統(tǒng)一的滿足多種需求的網(wǎng)絡(luò)通信協(xié)議和網(wǎng)絡(luò)服務(wù)支持策略,從而屏蔽應(yīng)用相關(guān)帶來的WSNs設(shè)計差異復(fù)雜性,在節(jié)能環(huán)保方面,WSNs將最大限度降得WSNs的功耗,并且最大限度利用基于IP的上下文網(wǎng)絡(luò),使基于IEEE 802.15.4通信協(xié)議的WSNs與基于IPv6協(xié)議的互聯(lián)網(wǎng)的實現(xiàn)統(tǒng)一尋址,保證物聯(lián)網(wǎng)時代網(wǎng)絡(luò)層向傳輸層提供靈活簡單、無連接、滿足QoS需求的數(shù)據(jù)報服務(wù),繼續(xù)研究開發(fā)基于多宿主的網(wǎng)絡(luò)傳輸,增強基于WSNs的物聯(lián)網(wǎng)絡(luò)可靠性和魯棒性、實現(xiàn)負(fù)載均衡、減少傳輸延遲、降低用戶開銷的實際意義。
4.物聯(lián)網(wǎng)在工業(yè)應(yīng)用中的機遇與挑戰(zhàn)
4.1物聯(lián)網(wǎng)在工業(yè)應(yīng)用遇到的應(yīng)用機遇:
隨著世界經(jīng)濟的一體化和世界經(jīng)濟的快速發(fā)展尤其是世界經(jīng)濟工業(yè)化的發(fā)展,物聯(lián)網(wǎng)在工業(yè)方面的應(yīng)用越發(fā)廣泛,因此物聯(lián)網(wǎng)越發(fā)需要快速發(fā)展并且盡可能適應(yīng)客戶需求,從全球經(jīng)濟和信息產(chǎn)業(yè)發(fā)展趨勢來看,物聯(lián)網(wǎng)時代即將來臨。而由于物聯(lián)網(wǎng)的發(fā)展,使物品和服務(wù)功能都發(fā)生了質(zhì)的飛躍,這些新的功能將給使用者帶來進(jìn)一步的高效、便利和安全,由此形成基于這些功能的新興產(chǎn)業(yè)。物聯(lián)網(wǎng)將依托物品識別、傳感和傳動、網(wǎng)絡(luò)通信、數(shù)據(jù)存儲和處理、智能物體等技術(shù)形成龐大的產(chǎn)業(yè)群。
這些都刺激了工業(yè)的發(fā)展,而在汽車、家電、工程機械、船舶等行業(yè)通過應(yīng)用物聯(lián)網(wǎng)技術(shù),提高了產(chǎn)品的智能化水平,實現(xiàn)產(chǎn)品的信息化。物聯(lián)網(wǎng)技術(shù)應(yīng)用于生產(chǎn)線過程檢測、實時參數(shù)采集、生產(chǎn)設(shè)備與產(chǎn)品監(jiān)控管理、材料消耗監(jiān)測等,可以大幅度提高生產(chǎn)智能化水平。在企業(yè)管理方面,物聯(lián)網(wǎng)技術(shù)主要應(yīng)用于供應(yīng)鏈管理、生產(chǎn)管理等領(lǐng)域。在供應(yīng)鏈管理方面,物聯(lián)網(wǎng)技術(shù)主要應(yīng)用于運輸、倉儲等物流管理領(lǐng)域。而物在紡織、食品飲料、生產(chǎn)車間、化工等流程型行業(yè)的生產(chǎn)設(shè)備管理領(lǐng)域,物聯(lián)網(wǎng)技術(shù)得到應(yīng)用。
而利用物聯(lián)網(wǎng)技術(shù)建立污染源自動監(jiān)控系統(tǒng),可以對工業(yè)生產(chǎn)過程中排放的污染物COD等關(guān)鍵指標(biāo)進(jìn)行實時監(jiān)控,為優(yōu)化工藝流程提供依據(jù)。通過建立基于物聯(lián)網(wǎng)技術(shù)的礦山井下人、機、環(huán)監(jiān)控及調(diào)度指揮綜合信息系統(tǒng),對采掘、提升、運輸、通風(fēng)等關(guān)鍵生產(chǎn)設(shè)備進(jìn)行狀態(tài)監(jiān)測和故障診斷,監(jiān)測溫度、濕度、瓦斯?jié)舛鹊葹槊禾?、鋼鐵、有色等行業(yè)保障安全生產(chǎn)。
在物聯(lián)網(wǎng)技術(shù)逐步發(fā)展,應(yīng)用越發(fā)廣泛的今日,世界各國政府更加重視,相繼制定了一系列的政策支持物聯(lián)網(wǎng)的發(fā)展。而今全球環(huán)境惡劣能源危機、金融危機等要求經(jīng)濟增長,物聯(lián)網(wǎng)能夠改變目前的生產(chǎn)方式,減少環(huán)境污染與資源浪費,是經(jīng)濟增長的一個重要方面。
4.2 物聯(lián)網(wǎng)在工業(yè)應(yīng)用遇到的挑戰(zhàn)
如今,物聯(lián)網(wǎng)還面臨著許多的挑戰(zhàn):
1)目前物聯(lián)網(wǎng)的發(fā)展依然處于不完善的階段,各項技術(shù)標(biāo)準(zhǔn)并不統(tǒng)一,終端廠商、應(yīng)用廠商、集成商無法有效分工協(xié)作,產(chǎn)業(yè)分工不能細(xì)化,影響整個產(chǎn)業(yè)規(guī)?;陌l(fā)展。2)各種終端的信息采集涉及大量的個人隱私以及商業(yè)機密,必須保證數(shù)據(jù)的安全性,信息安全與隱私問題一直是物聯(lián)網(wǎng)的難點,許多安全隱私細(xì)節(jié)需要不斷的細(xì)化,以保證信息不被泄露。
3)物聯(lián)網(wǎng)應(yīng)用層面的信息需要互聯(lián)和融合,需要打破不同行業(yè)領(lǐng)域之間的行業(yè)壁壘,各行業(yè)之間相互合作,才能最好地發(fā)展物聯(lián)網(wǎng)。
4)物聯(lián)網(wǎng)將使IP 地址的需求呈指數(shù)級增長,許多地址資源無法支撐。
4.3 抓住機遇,迎接挑戰(zhàn)
如今世界各國都在競爭國際標(biāo)準(zhǔn)制定的主導(dǎo)和控制,這將無疑促進(jìn)物聯(lián)網(wǎng)技術(shù)的發(fā)展。為解決物聯(lián)網(wǎng)的研究和應(yīng)用中遇到的問題,世界各國需要進(jìn)一步制定相應(yīng)政策適應(yīng)物聯(lián)網(wǎng)的發(fā)展,迎接物聯(lián)網(wǎng)時代。當(dāng)前物聯(lián)網(wǎng)相關(guān)產(chǎn)業(yè)發(fā)展,有利于未來經(jīng)濟的可持續(xù)發(fā)展;物聯(lián)網(wǎng)有些關(guān)鍵技術(shù)需要投入大量的人力、財力以及物力,以保證物聯(lián)網(wǎng)的正常發(fā)展。物聯(lián)網(wǎng)的發(fā)展應(yīng)該注重于發(fā)揮內(nèi)部優(yōu)勢、減少內(nèi)部劣勢、抓住外部機遇、減輕外部威脅。
當(dāng)前我們唯有于抓住機遇,物聯(lián)網(wǎng)產(chǎn)業(yè)環(huán)境分析與發(fā)展預(yù)測
物聯(lián)網(wǎng)產(chǎn)業(yè)環(huán)境復(fù)雜多樣,可采用PEST分析法,總結(jié)當(dāng)前世界物聯(lián)網(wǎng)的產(chǎn)業(yè)環(huán)境??芍?dāng)今世界各國對物聯(lián)網(wǎng)產(chǎn)業(yè)的重視程度加深,而物聯(lián)網(wǎng)刺激經(jīng)濟法發(fā)展,反之也為發(fā)展的經(jīng)濟刺激其發(fā)展要求,從而為進(jìn)一步發(fā)展奠定基礎(chǔ),而如今的信息和隱私安全是物聯(lián)網(wǎng)發(fā)展中需要攻克的難題,最終物聯(lián)網(wǎng)因為其本身涉及技術(shù)領(lǐng)域的廣泛注定其一定的產(chǎn)業(yè)環(huán)境適應(yīng)其研究開發(fā)要求。
物聯(lián)網(wǎng)產(chǎn)業(yè)的預(yù)測有利于國家更好的把握物聯(lián)網(wǎng)產(chǎn)業(yè)發(fā)展節(jié)奏,對各地區(qū)物聯(lián)網(wǎng)發(fā)展的規(guī)劃有借鑒意義。
分析部分資料可以做出結(jié)論,如今的物聯(lián)網(wǎng)已過了探索性,而正處于快速發(fā)展期,在這段時期,物聯(lián)網(wǎng)標(biāo)準(zhǔn)形成,各種產(chǎn)業(yè)融合發(fā)展,未來的五年將會呈穩(wěn)定增長的狀態(tài),各種產(chǎn)業(yè)深度融合,大約五年后物聯(lián)網(wǎng)技術(shù)和產(chǎn)業(yè)成熟,并對傳統(tǒng)產(chǎn)業(yè)的改造和提升,將物聯(lián)網(wǎng)技術(shù)和理念融入到各行各業(yè)中,并成為其發(fā)展的推動力量。我國團隊在工業(yè)物聯(lián)網(wǎng)方面的技術(shù)和產(chǎn)品以及產(chǎn)業(yè)化
我國是世界是最早研究物聯(lián)網(wǎng)的國家之一,物聯(lián)網(wǎng)的研究時間長,因此物聯(lián)網(wǎng)事業(yè)處于世界領(lǐng)先位置。
2006 年,我國制定了2006 年-2020 年的信息化的發(fā)展戰(zhàn)略,其中介紹了全球信息化和我國信息化的發(fā)展趨勢,我國的戰(zhàn)略思想以及戰(zhàn)略目標(biāo)我國具有代表性的研究機構(gòu)都已經(jīng)并將繼續(xù)實施對物聯(lián)網(wǎng)各個方面的研究。目前大多數(shù)的高校將物聯(lián)網(wǎng)作為一個重要的研究方向。
物聯(lián)網(wǎng)產(chǎn)業(yè)涉及的技術(shù)相對比較多,主要包括RFID 技術(shù)、傳感器技術(shù)、云計算技術(shù)、網(wǎng)絡(luò)與通信技術(shù)、中間件技術(shù)等。我國關(guān)于RFID 技術(shù)的企業(yè)大多數(shù)都集中在低頻與高頻領(lǐng)域,具體超過100 多家,超高頻和微波RFID技術(shù)的企業(yè)比較少,缺乏一些關(guān)鍵技術(shù)。2010 年3 月25 日,“傳感網(wǎng)絡(luò)信息處理服務(wù)和接口規(guī)范”國際標(biāo)準(zhǔn)的提案通過,標(biāo)志著我國具有了本土化的國際協(xié)議,在傳感網(wǎng)領(lǐng)域成為了國際標(biāo)準(zhǔn)主導(dǎo)國之一。而在其他方面的技術(shù)上,我國也相對發(fā)呆,在世界領(lǐng)先水平中占據(jù)一席之地。結(jié)論
物聯(lián)網(wǎng)技術(shù)飛速,未來是物聯(lián)網(wǎng)的時代,是個高度感知和信息控制的時代, 是個虛擬和現(xiàn)實逐漸融合的時代, 技術(shù)和市場相互依存。我們應(yīng)抓住戰(zhàn)略機遇,緊緊圍繞轉(zhuǎn)變經(jīng)濟發(fā)展方式,綜合使用各種資源,調(diào)動各方面力量,在物聯(lián)網(wǎng)應(yīng)用上加大研究,盡最大努力奪取物聯(lián)網(wǎng)國際標(biāo)準(zhǔn)制定的主導(dǎo)和控制,才能在物聯(lián)網(wǎng)領(lǐng)域立于不敗之地。
參考文獻(xiàn):
《物聯(lián)網(wǎng):概念、架構(gòu)與關(guān)鍵技術(shù)研究綜述》——孫其博,劉杰,黎羴,范春曉,孫娟娟; 《物聯(lián)網(wǎng)的研究現(xiàn)狀及其產(chǎn)業(yè)化》——李昆侖,繆澤峰,章劍雄; 《物聯(lián)網(wǎng)技術(shù)淺析》——趙富安,趙宇;
《面向物聯(lián)網(wǎng)的無線傳感器網(wǎng)絡(luò)綜述》——錢志紅,王義軍; 《物聯(lián)網(wǎng)產(chǎn)業(yè)機遇與挑戰(zhàn)》——王金寶;
《中國發(fā)展物聯(lián)網(wǎng)面臨的機遇與挑戰(zhàn)》——謝新梅; 《物聯(lián)網(wǎng)在工業(yè)中的應(yīng)用》——陶冶,殷振華; 《物聯(lián)網(wǎng)技術(shù)的發(fā)展及其工業(yè)應(yīng)用的方向》——彭宇;
《基于神經(jīng)網(wǎng)絡(luò)組合模型的物聯(lián)網(wǎng)產(chǎn)業(yè)發(fā)展預(yù)測研究》——張亞斌,侯思華; 《物聯(lián)網(wǎng)關(guān)鍵技術(shù)與應(yīng)用》——劉強,崔莉,陳海明; 《物聯(lián)網(wǎng)感知技術(shù)探討》——馬海晶;
《我國物聯(lián)網(wǎng)的產(chǎn)業(yè)環(huán)境分析》——劉文昌,呂紅霞,李曉楠;
第五篇:物聯(lián)網(wǎng)總結(jié)
物聯(lián)網(wǎng)培訓(xùn)總結(jié)
物聯(lián)網(wǎng)(Internet of Things)是一個基于互聯(lián)網(wǎng)、傳統(tǒng)電信網(wǎng)等信息承載體,讓所有能夠被獨立尋址的普通物理對象實現(xiàn)互聯(lián)互通的網(wǎng)絡(luò)。它是通過射頻識別(RFID)、紅外感應(yīng)器、全球定位系統(tǒng)、激光掃描器等信息傳感設(shè)備,按約定的協(xié)議,把任何物品與互聯(lián)網(wǎng)相連接,進(jìn)行信息交換和通信,以實現(xiàn)對物品的智能化識別、定位、跟蹤、監(jiān)控和管理的一種網(wǎng)絡(luò)。它具有普通對象設(shè)備化、自治終端互聯(lián)化和普適服務(wù)智能化3個重要特征。
物聯(lián)網(wǎng)將開啟一個全新的信息時代,對此,許多發(fā)達(dá)國家投入巨資深入研究該技術(shù)并將知識產(chǎn)權(quán)專利戰(zhàn)略上升為國家發(fā)展戰(zhàn)略。隨著物聯(lián)網(wǎng)等高新技術(shù)的迅速發(fā)展,知識產(chǎn)權(quán)作為一種無形資產(chǎn)在高新技術(shù)產(chǎn)業(yè)中的地位越來越重要,所占比重也越來越大。在世界傳感網(wǎng)領(lǐng)域,我國是標(biāo)準(zhǔn)主導(dǎo)國之一,專利擁有量高。因此,中國應(yīng)該利用物聯(lián)網(wǎng)發(fā)展優(yōu)勢,爭取早日在全球范圍內(nèi)以知識產(chǎn)權(quán)支撐中國物聯(lián)網(wǎng)全球化。
知識產(chǎn)權(quán)保護(hù)制度的完善,可以有力地促進(jìn)物聯(lián)網(wǎng)產(chǎn)業(yè)的發(fā)展。在中國知識產(chǎn)權(quán)法律制度還在逐步完善的過程中,物聯(lián)網(wǎng)新技術(shù)的產(chǎn)生和應(yīng)用面臨著如下問題:
1、國家安全問題
中國大型企業(yè)、政府機構(gòu),如果與國外機構(gòu),進(jìn)行項目合作,如何確保企業(yè)商業(yè)機密、國家機密不被泄漏?這不僅是一個技術(shù)問題,而且還涉及到國家安全問題,必須引起高度重視。
2、隱私問題
在物聯(lián)網(wǎng)中,射頻識別技術(shù)是一個很重要的技術(shù)。在射頻識別系統(tǒng)中,標(biāo)簽有可能預(yù)先被嵌入任何物品中,比如人們的日常生活物品中,但由于該物品(比如衣物)的擁有者,不一定能夠覺察該物品預(yù)先已嵌入有電子標(biāo)簽以及自身可能不受控制地被掃描、定位和追蹤,這勢必會使個人的隱私問題受到侵犯。因此,如何確保標(biāo)簽物的擁有者個人隱私不受侵犯便成為射頻識別技術(shù)以至物聯(lián)網(wǎng)推廣的關(guān)鍵問題。
3、物聯(lián)網(wǎng)的政策和法規(guī)
物聯(lián)網(wǎng)的發(fā)展不僅需要技術(shù),而且牽涉到各個行業(yè),各個產(chǎn)業(yè),需要多種力量的整合。這就需要國家的產(chǎn)業(yè)政策和立法上要走在前面,制定出適合這個行業(yè)發(fā)展的政策和法規(guī),保證行業(yè)的正常發(fā)展。
4、技術(shù)標(biāo)準(zhǔn)的統(tǒng)一與協(xié)調(diào)
物聯(lián)網(wǎng)發(fā)展過程中,傳感、傳輸、應(yīng)用各個層面會有大量的技術(shù)出現(xiàn),可能會采用不同的技術(shù)方案。如果各行其是,就不能形成規(guī)模經(jīng)濟,不能形成整合的商業(yè)模式,也不能降低研發(fā)成本。因此,盡快統(tǒng)一技術(shù)標(biāo)準(zhǔn),形成一個管理機制,這是物聯(lián)網(wǎng)急需面對的問題。
5、安全體系的建立與形成
物聯(lián)網(wǎng)目前的傳感技術(shù)主要是RFID,植入這個芯片的產(chǎn)品,是有可能被任何人進(jìn)行感知的,比如產(chǎn)品的競爭對手,那么如何做到在感知、傳輸、應(yīng)用過程中,這些有價值的信息可以為我所用,卻不被別人所用,這就需要在安全上下功夫,形成一套強大的安全體系。此外,物聯(lián)網(wǎng)的健康發(fā)展與知識產(chǎn)權(quán)制度存在著密不可分的聯(lián)系,主要體現(xiàn)在以下幾個方面:
1.物聯(lián)網(wǎng)的健康發(fā)展.需要一個公平競爭的市場環(huán)境。物聯(lián)網(wǎng)的健康發(fā)展涉及到物聯(lián)網(wǎng)核心技術(shù)信息的保護(hù)問題,而知識產(chǎn)權(quán)制度是保護(hù)信息的一種法律工具。知識產(chǎn)權(quán)屬于一種“信息產(chǎn)權(quán)”,從某種意義上講,它是對符合法定條件的、處于專有領(lǐng)域的一些“信息”提供的法律保護(hù)。作為構(gòu)建物聯(lián)網(wǎng)的核心技術(shù)信息是可以作為“商業(yè)秘密”直接得到知識產(chǎn)權(quán)法的保護(hù)的,當(dāng)然,物聯(lián)網(wǎng)中進(jìn)行的商業(yè)競爭也要受到反不正當(dāng)競爭法的制約和限制。不僅如此,現(xiàn)在知識產(chǎn)權(quán)的版權(quán)保護(hù),已經(jīng)延伸到網(wǎng)絡(luò)環(huán)境中,對作品(也是一種信息)的傳播、利用進(jìn)行保護(hù),這對物聯(lián)網(wǎng)的健康發(fā)展.顯得尤為重要。
2.物聯(lián)網(wǎng)的經(jīng)營模式可以成為專利保護(hù)的一種客體
物聯(lián)網(wǎng)產(chǎn)業(yè)的幾乎每一個環(huán)節(jié)都涉及到標(biāo)準(zhǔn)及知識產(chǎn)權(quán)問題。如沒有遠(yuǎn)見卓識,不提早布局,必受制于人。而強調(diào)創(chuàng)新能力,進(jìn)行知識產(chǎn)權(quán)布局也與我國的創(chuàng)新型國家建設(shè)思路相吻合。
在未來“物聯(lián)網(wǎng)”時代的競爭中,要想贏得這一場科技戰(zhàn)爭,除了改變現(xiàn)有互聯(lián)網(wǎng)及通信領(lǐng)域受制于人的格局,我們在做好研發(fā)和產(chǎn)業(yè)推動的前提下必須做好知識產(chǎn)權(quán)創(chuàng)新保護(hù)工作。
1.掌握物聯(lián)網(wǎng)核心技術(shù)標(biāo)準(zhǔn),提前布局知識產(chǎn)權(quán)
物聯(lián)網(wǎng)的發(fā)展處于起步階段,不同于傳統(tǒng)的通信和互聯(lián)網(wǎng)領(lǐng)域,知識產(chǎn)權(quán)都掌握在歐美等發(fā)達(dá)國家,我們每生產(chǎn)出一臺手機或設(shè)備都需要向持有專利公司繳納專利轉(zhuǎn)讓費。所以在物聯(lián)網(wǎng)的起步階段,我們應(yīng)投入較大的精力進(jìn)行基礎(chǔ)和應(yīng)用方面的研究,只有掌握了核心技術(shù),才不受制于人。除了進(jìn)行核心技術(shù)儲備,我們還應(yīng)該積極參與國際標(biāo)準(zhǔn)的制定工作.只有將自己掌握的核心技術(shù)納入國際標(biāo)準(zhǔn),才可能產(chǎn)生巨大的經(jīng)濟效益。
物聯(lián)網(wǎng)產(chǎn)業(yè)發(fā)展的每一個環(huán)節(jié)幾乎都涉及到標(biāo)準(zhǔn)及知識產(chǎn)權(quán)問題,我們必須提早布局,重視整個產(chǎn)業(yè)鏈的知識產(chǎn)權(quán)創(chuàng)新保護(hù)。
2.強化知識產(chǎn)權(quán)國家戰(zhàn)略,進(jìn)一步完善知識產(chǎn)權(quán)制度 隨著世界范圍內(nèi)知識產(chǎn)權(quán)保護(hù)水平的不斷提高.知識產(chǎn)權(quán)在世界經(jīng)濟和科技發(fā)展中的作用日益凸現(xiàn)。我國2008年制定的《國家知識產(chǎn)權(quán)戰(zhàn)略綱要》,提出了到2020年,把我國建設(shè)成為知識產(chǎn)權(quán)創(chuàng)造、運用、保護(hù)和管理水平較高國家的知識產(chǎn)權(quán)戰(zhàn)略目標(biāo)。
在物聯(lián)網(wǎng)時代即將到來的時刻,國家相關(guān)部門和企業(yè)應(yīng)結(jié)合物聯(lián)網(wǎng)的發(fā)展盡快落實具體策略,盡快達(dá)成這一戰(zhàn)略目標(biāo)。知識產(chǎn)權(quán)保護(hù)部門應(yīng)及時修訂專利法、商標(biāo)法、著作權(quán)法等知識產(chǎn)權(quán)專門法律及有關(guān)法規(guī),以應(yīng)對新時期知識產(chǎn)權(quán)保護(hù)的新特點。適時做好物聯(lián)網(wǎng)相關(guān)遺傳資源、傳統(tǒng)知識、民間文藝和地理標(biāo)志等方面的立法工作。加強物聯(lián)網(wǎng)知識產(chǎn)權(quán)立法的銜接配套,增強法律法規(guī)可操作性。
3.充分利用知識產(chǎn)權(quán)資源
企業(yè)在新產(chǎn)品開發(fā)和技術(shù)改造過程中,對具備新穎性、創(chuàng)造性和實用性,又符合其專利申請條件的技術(shù)或產(chǎn)品,要及時申請專利,使科研成果獲得法律保護(hù)。同時,企業(yè)要在申請專利等知識產(chǎn)權(quán)保護(hù)工作中完善技術(shù)秘密保護(hù)制度.對在研項目和尚未形成成果的項目加強技術(shù)保密。要明確企業(yè)在與員工簽訂勞動合同的同時簽訂保密協(xié)議,以更好地維護(hù)企業(yè)的權(quán)益,避免因技術(shù)秘密的泄露給公司造成巨大損失。
“物聯(lián)網(wǎng)產(chǎn)業(yè)技術(shù)知識產(chǎn)權(quán)保護(hù)培訓(xùn)班”的學(xué)習(xí)開拓了我的眼界,有利于我更好地認(rèn)識不斷發(fā)展的世界。物聯(lián)網(wǎng)的內(nèi)涵即為凡是有傳感器和傳感技術(shù)而感知物體的特性來按照固定的協(xié)議實現(xiàn)任何時候物與物之間、人和物之間、人與人之間互聯(lián)互通,實現(xiàn)智能化識別定位跟蹤管理的網(wǎng)絡(luò)。物聯(lián)網(wǎng)還是互聯(lián)網(wǎng)的一個延伸,互聯(lián)網(wǎng)是一個人文世界,它提供了人與人的交流;物聯(lián)網(wǎng)則把人文世界向物理世界延伸。
物聯(lián)網(wǎng)“感知中國”已成為國家信息產(chǎn)業(yè)發(fā)展戰(zhàn)略,對國家電子產(chǎn)業(yè)、物流、乃至于電力、交通、安防等相關(guān)領(lǐng)域都起著很大的作用。當(dāng)物聯(lián)網(wǎng)技術(shù)完全融入我們的生活和工作時,人類將進(jìn)入一個全新的智能化時代,那時人類社會呈現(xiàn)出的面貌將是我們現(xiàn)在無法想象的,這也必將對知識產(chǎn)權(quán)保護(hù)制度的改革提出新的課題和挑戰(zhàn)!
因此,作為一名知識產(chǎn)權(quán)相關(guān)工作人員,除了要做好本職工作,還要緊跟時代的潮流,不斷學(xué)習(xí)物聯(lián)網(wǎng)等高新技術(shù)的知識產(chǎn)權(quán)保護(hù)制度,幫助企業(yè)逐步完善知識產(chǎn)權(quán)保護(hù)體系,把加強知識產(chǎn)權(quán)保護(hù)作為其在科技、經(jīng)濟領(lǐng)域奪取和保持市場競爭優(yōu)勢的一項重要戰(zhàn)略措施。