Font Size: a A A

Research On Key Technology Of Addressing Security Of Internet Of Things

Posted on:2020-06-27Degree:DoctorType:Dissertation
Country:ChinaCandidate:H Q WangFull Text:PDF
GTID:1488306494969279Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the extension and expansion of Internet,Io T brought a new wave of information industry,which has attracted widespread attention in all walks of life.It has been used in many fields,such as intelligent transportation,environmental protection,government work,public safety,safe home,intelligent fire protection,industrial detection,agricultural cultivation,food traceability and so on.Frome project planning to industrial policy,domestic and foreigh related industries are actively involved in intensive research.The objects connected in Io T include all kinds of things in people's daily life(including people).The number of these objects is not comparable to the numble of Internet nodes nowadays.In order to achieve effective communication between these things and various kinds of information acquisition,transmission and exchange between people and things,Io T addressing is the primary solution to ensure the smooth operation of Io T.Io T addressing technology refers to the way in which the resource addressing system finds or retrieves the corresponding resource address through the resource name in Io T,that is,completes the positioning process from the identification to the target object,resources or information,and chooses the communication route according to the communication address.Io T addressing technology is the core function to ensure the realization of Io T.Io T resource addressing involves a lot of sensitive information such as products,manufactures and logistics,which brings higher security requirements such as privacy protection.Therefore,analyzing the security threats in the addressing process of Io T and researching the security addressing technology suitable for the needs of Io T in view of its particularity are the key issues in Io T.In this paper,the zero-knowledge proof protocol,trust mechanism,cryptographic algorithm and other related security theories and methods are used to analyze Io T addressing hierarchy and security risks.According to the possible privacy leakage problems in the different levels of addressing,one secure and efficient Io T addressing scheme is proposed.Our contributions in this paper are:(1)One secure and efficient code resoluion method for Io T is proposed.Analyzing the terminal coding and resolution methods suitable for the characteristics of Io T,with the two-way authentication method based on elliptic curve cryptography(ECC),installing security agents,starting the result transmission process,and adding caches,one secure and efficient code resoluing method for Io T is put forward.Two-way authentication before resolution can provide privacy protection.Security agent and the resolution result transmission process can avoid over-revealing privacy information of the product and merchant.In the resolution result transmission process,the NAPTR result records will be pre-processed,which can avoid the shortcomings of IV returning many NAPTR records.Adding caches to save different query results can improve the efficiency of Io T code resolution.(2)One ONS anonymous authentication model with trust mechanism is proposed.Analyzing the security risks of ONS resolution process and investigating the security transmission model of Io T,with the zero knowledge proof based on elliptic curve and trust mechanism,one anonymous anthentication model of ONS is put forward.This model can get rid of the bondage of trusted third-party platform.Only certifier and verifier are involved during certification.With the trust mechanism,this model can improve the resolution efficiency.Once certified,many times of resolving services can be provided.The number of resolving services is determined by trust value.(3)One extendible IPSec compression method based on 6Lo WPAN is proposed.Researching on the compression mechanism of 6Lo WPAN,based on the context,analyzing each field of AH and ESP,an extendible compression method is developed.The method is carried out by resetting AH and ESP header compression formats,adding a MOD field,setting different working modes.Athentication,encryption,and a mixture of certification and encryption are provided as flexible options.In addion,the value of the original IPv6 extensible header ID(EID)field can be retained,while the number of occupied NHC?ID values can be decreased for future extendibility.Finally,based on the above research,one security addressing model of Io T is designed,which provides a secure and efficient resolution solution for product code,creates gateway devices for secure interconnection between Internet and Io T and realizes the secure transmission of packets between Io T sensor node and Internet IPv6 host.The perception node of Io T uses the development board which carries the Contiki operating system.The IPv6 host is the common terminal on Internet.The core equipment of the hardware environment is the gateway which realizes the security and interconnection of the two heterogeneous networks.The gateway is composed of the Linux host and the development board controller.The software design is manily the adaptation function of6 Lo WPAN,including the header compression,decompression,fragmentation,reorganization,6Lo WPAN routing discovery protocol to achieve the automatic configuration and maintenance of IPv6 address of Io T nodes.The resolution result of product code verifies the feasibility of the solution in hardware environment.The interconnection between the Io T sensor node and the Internet IPv6 host is verified by the running of the Ping6 application program,and the IPSec compression technology based on 6Lo WPAN protocol is validated by the successful sending and receiving of self-contained UDP packets encapsulated by IPSec.
Keywords/Search Tags:IoT, addressing, addressing security, ONS, authentication, trust mechanism, IPSec, 6LoWPAN
PDF Full Text Request
Related items