Font Size: a A A

Research On Key Techniques For Security Protection And Service Optimization In New Internet Of Things

Posted on:2019-12-23Degree:DoctorType:Dissertation
Country:ChinaCandidate:L H GuoFull Text:PDF
GTID:1368330590970400Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
The Internet of Things(IoT)establishes information communication between sensing devices and applications through networks,which contributes to smart identification and management.With the development of technologies and industries,the framework of the IoT standards and key technologies has been rapidly promoted.At the same time,the next generation network has been one of the promising technologies in the development of IoT.It attaches great attention in the field of academic and industry.With the increased number of nodes,the platform collects massive data.The utilization of big data can optimize service and improve the quality.The new IoT are developing towards the trends of standardization,integration with next-generation networks and big data.However,in the application layer of IoT,its supporting platforms are diverse,which leads to the independent security policies among platforms and lacks a unified security protection system.In the network layer,the network environment is open and complex,where multiple communication networks are stacked.The heterogeneous network is vulnerable to network attacks.Some nodes are limited to computation and energy resource.The perceptive layer cannot employ complicated security technologies to resist external security attacks.Therefore,the new Internet of Things urgently needs reliable technologies in security protection.On the other hand,the IoT converges with traditional industries and personal consumption areas,resulting in abundant services and applications.With the rapid growing number of nodes and data in IoT,network performance and service quality are sensitive in some applications.The new IoT needs optimization technologies towards network services and application services.To solve the proposed problems in new IoT,the main work and contributions of this thesis are summarized as follows:1)A secure communication mechanism is proposed for IoT under the ISO/IEC/IEEE 21451 standard.The security algorithms are proposed to improve the network performance.A secure time synchronization mechanism is designed to achieve reliable time synchronization support for ISO/IEC/IEEE 21451 sensor networks using lightweight cryptographic algorithms.2)A security protection and network service optimization mechanism for information-centric networking IoT is proposed.Taking smart grid as an example,the evolution mechanism of information centric networking is proposed in IoT.In addition,the network performance of IoT using information-centric networking is improved with the proposed scheme.With the social relations of IoT users,the content requests of IoT nodes are predicted.The content cache in the network is optimized according to the prediction results.3)The optimization mechanism is proposed for data security and application service for IoT in the big data environment.Taking the IoT-based shared travel platform as an example,the algorithm of authentication,secure data collection and secure storage in big data environment are proposed.In addition,big data contributes to predicting the satisfaction between nodes and users.The matching services in the platform are optimized.4)IoT trust evaluation framework is established and the protection scheme against collusion attacks is proposed.Based on suspicious behavior,a security assessment algorithm is proposed to evaluate the direct trust.To fight against the collusion attacks that may exist in indirect trust,we propose two algorithms and calculate the indirect trust.
Keywords/Search Tags:Internet of Things, Security Protection, Service Optimization, ISO/IEC/IEEE 21451 standard, Information-Centric Networking, Big data, Trust
PDF Full Text Request
Related items