Font Size: a A A

Design Of Cotton Storage Io T System Platform And Research On Information Security

Posted on:2016-03-16Degree:MasterType:Thesis
Country:ChinaCandidate:Y J LiFull Text:PDF
GTID:2308330461956933Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the development of Internet of Things technology, it has developed to the national strategic level as one of the emerging industry. In addition to the great convenience to people’s production and life, at the same time a variety of Internet of Things applications have brought great challenges to information security. It has a serious impact on many major technological innovations and industrial development, which has attracted much attention from all of governments, enterprises and research institutions.In view of the blank research on Internet of Things applying to cotton warehouse system platform in China, this article provide a good way to comprehensively grasp cotton storage environmental information in real-time, so as to provide a basis for analyzing of cotton quality in the storage process. At the same time, this article made relative strategic research on the security of information transmission by Internet of Things technology.This paper designed a set of environmental monitoring system plan for cotton storehouse, to achieve the hierarchical management for the local and central level remote data center cotton warehouse management. Because of the immediate cotton warehouse and the alternative warehouse throughout the country, to achieve the data transmission from the local cotton warehouse to the central level remote data center. It is necessary to achieve data transmission through the network. Due to the transparency of the public network, you need to take protective measures against the transmission of data. This article designed a secure data transmission system. First, by comparing the advantages and disadvantages of symmetric encryption algorithm used and asymmetric encryption algorithms, selected the DES_RSA combining encryption algorithm to encrypt data. Makes the system not only has the fast of DES encryption and decryption algorithm, but also has the convenient of transport management RSA encryption algorithm key. In terms of communication transmission, using a VPN technology, trusted border security gateways has been deployed at the exit of the central data center, to block requests from other web pages and to compensate for the transparency of the public network, make the transmission of data is fast and secure.
Keywords/Search Tags:Cotton storage, Internet of Things, Information security, Encryption algorithm, VPN technology
PDF Full Text Request
Related items