Font Size: a A A

Research And Design Of Intelligent Building System Security Policy

Posted on:2010-08-13Degree:MasterType:Thesis
Country:ChinaCandidate:C G BaiFull Text:PDF
GTID:2208360308466093Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In the 21st century, intelligent building is the dominant direction of the construction industry. It is the combination of construction technology and electronic information technology product. Commonly we call it "5A", because it generally contains five major elements: Building Automation System (BAS), Communication Automation System (CAS), Office Automation System (OAS), the Fire Services Automation System (FAS), Security Automation System (SAS). Looking at the overall situation, building intelligent information technology is the core and foundation. It supports various parts of the system of communication and affects the reliability of automation systems. This mainly refers to the reliability of anti-offensive system and data security. The security function of information technology is directly related to finish the normal operation. The network also has transmission of data and sharing of information. So in the event of network security issues, the system may result to function out of control for some parts or make the entire system crashed. With intelligent features and architecture of the services more and more integrated, most of the features are going to be based on a unified platform. So meanwhile, the system also increases a risk.In this thesis, in order to manage the problem of security for intelligent buildings, we designed a security protecting system. We put the whole system into three different kinds of equipment by their levels, and introduce both centralized and distributed structure to provide high efficiency and stability services. For the Internet, we use different firewall strategy to prevent the building from invasion. For the Intranet, we manage the data transformation in order to keep the data safe and stable, and at the same time provide a more detail firewall strategy. The main work of the thesis is that we add a encryption layer, a coding layer and a firewall between the network connection of each peer. The encryption layer does the encryption on the original data, which makes data difficult to be listened. Coding layer uses network coding to increase the difficulty of tapping data by transferring important data in small packages or through different paths. Firewall can also guard against the invasion and protect the system to run well.
Keywords/Search Tags:intelligent building, firewall, network coding, data encryption
PDF Full Text Request
Related items