Font Size: a A A

Research On Application Of Security Management Mechanism Wireless Connected Mode In Internet Of Things

Posted on:2012-08-01Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiFull Text:PDF
GTID:2178330335969656Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Recently, as communication technology is gaining rapid expansion and the Internet (IOT) has been more and more widespread, the Internet of things has been already a research hotspot. The Internet of things has changed the traditional information acquisition methods which actuate informatization age into a new stage. This paper brings forward a kind of security management mechanism to solve the wireless connected pattern of the Internet of things which could provide infrastructural support for the security of the Internet of things.At first this paper introduces the background knowledge and the state of the field of Internet of things as well as security of Internet of things. Then the research thought and research have been decided. The security problem and relative technique have been analyzed in the forepart of this paper. Considering the existing researches the wireless connected security architecture has been put forward.Secondly, this paper design a full set of security management methods according to the security architecture, which could provide resolution for different problem faced by different hierarchy. The specific methods of security management include user authentication algorithm, Data Encryption during data transmission, server security management.Thirdly, based on security management methods this paper has divided the wireless connected IOT security management system into two modules which are the terminal side and the server side. Subsequently, the sub security modules have been detailedly designed and actualized according to the access process.Finally, the security management methods have been applies which are raised in this paper. The experimental results show that our methods could achieve a good security management performance on user access, authorization protection, server access control and database security.
Keywords/Search Tags:Internet of Things, Network Security, Network Management
PDF Full Text Request
Related items