Font Size: a A A

Research On Information Security Technology Of Internet Of Things Baseed On Blockchain

Posted on:2020-08-03Degree:MasterType:Thesis
Country:ChinaCandidate:R F YuFull Text:PDF
GTID:2428330596976591Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the continuous expansion of the Internet of Things application scenarios,the privacy security and vulnerability issues of IoT are inevitably exposed.However,because IoT has a decentralized topology generally,traditional security and privacy protection methods are usually not applicable to IoT.The blockchain is based on a distributed network,has a unique trust mechanism and irreversible modification of block data.It meets the decentralization and de-trust requirements of physical network for information security technology,and has natural advantages in IoT information security applications.Therefore,in order to make up for the shortcomings of traditional protection technology and ensure the information and user's privacy security of IoT.This paper aims to study the IoT information security technology based on blockchain,and to address the key issues of IoT security,design and implement two security protection technologies using blockchain technology.The main work of this paper is as follows:Firstly,the current research status of information security in IoT and blockchain technology using in IoT at home and abroad is analyzed.The security requirements of the Internet of Things and the existing security technologies are analyzed in detail.Then,the hierarchical model,working principle and technical characteristics of blockchain are studied.Especially,focus on the cryptography algorithm,consensus mechanism and block data storage model in blockchain technology and determine the feasibility of blockchain technology applied to IoT information security.For the security threats to the IoT information during transmission,using P2P(Peer-to-Peer)network technology to construct IoT decentralized management to prevent the entire IoT system from being attacked due to the attack of the central structure.Encrypts the transmitted data using a hybrid encryption mechanism and an authentication mechanism to prevent data theft and man-in-the-middle attacks.The consensus module based on PBFT(Practical Byzantine Fault Tolerance)algorithm is designed to improve the fault-tolerant performance of IoT for the validity verification of transmission information,and make full use of the surplus computing power of some nodes in the Internet of Things.For the security threats faced by IoT information in the storage process,a hierarchical storage structure is adopted,which is designed to be applicable to the data blocks of the Internet of Things and stored using distributed ledger technology.Finally,the above-mentioned blockchain-based information security technologies are tested for functional verification and anti-attack tests.Compared with traditional protection technologies,the protection effects are greatly improved,and the Internet of Things system has better robustness and fault tolerance capabilities,system critical information and user privacy are better protected.
Keywords/Search Tags:Internet of Things (IoT), Information Security, Distributed system, Blockchain, Consensus algorithm, Block storage
PDF Full Text Request
Related items