Font Size: a A A

Internet Of Things Privacy Data Protection Algorithm

Posted on:2013-04-27Degree:MasterType:Thesis
Country:ChinaCandidate:R Q ZhangFull Text:PDF
GTID:2248330371489200Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Internet of Things as a network of heterogeneous integration, not only exists the samesecurity issues as the Internet, Sensor Networks and Mobile Communication Network, but alsoexists the problem of physical capture and privacy protection because of its specificity. Therefore,we must summarize an effective proposal against physical capture, design reasonable privacyprotection mechanisms, to ensure the safety of communication information in the Internet ofThings。The work has been done in this article as follows:(1)This article studied the architecture and security key technologies of the Internet of Thingsthoroughly and deeply.(2) discussed the detection of the physical capture and technology of keydistribution. Furthermore, for the purpose of guaranteeing not to leak communication informationafter the physical devices were captured and reset into the network, I proposed a feasible solutionbased on the distributed detection and one-way key distribution.(3)against the security risks ofInternet of Things, this article proposed the “Underground Party” problem. The undergroundnodes play roles of security maintain in the network through trust collaboration and securemultiparty computation. The paper designed a method of realizing security authentication betweenthe underground nodes which is based on security mechanism of the (m, N) oblivious transferprotocol and information hiding algorithms, then I accomplished a search algorithm based on atrust optimized dynamic search set of single-double way. Meanwhile, I used Matlab software tomake simulation of the comparisons of optimization and non-optimization “Underground Party”searching efficiency on the basis of the probability model.The Main innovations of this dissertation had been proposed as follows. (1) Through reading lots of literatures about the resistance of physical capture, I summarizeda method which combined detection and key management to reduce the possibility ofcamouflaging communication after the nodes were captured.(2) The article proposed the problem of the “Underground Party” in the privacy protection ofInternet of Things and designed means of security authentication about the underground nodes.While by establishing trust transfer model, I put forward a novel and effective solutions about“underground Party” problem.
Keywords/Search Tags:Internet of Things, Resistance of physical capture, Oblivioustransfer, Information hiding
PDF Full Text Request
Related items