Font Size: a A A

Elevator Operating And Maintenance Platform Based On Internet Of Things

Posted on:2016-10-20Degree:MasterType:Thesis
Country:ChinaCandidate:Z ZhangFull Text:PDF
GTID:2298330467493123Subject:Information security
Abstract/Summary:PDF Full Text Request
With the rapid development of the world economy and the increasing level of technology, the elevators are used in more and more high-rise buildings. However, elevator accidents occur frequently. So protecting the safety of elevator, grasping the running state elevator becomes the urgent matter for elevator supervision department. The application of The Internet of Things in the operation and management of the elevator brought us a new management approach. We can monitor the operational status of the lift real-time; capture the abnormal situation timely, forecast elevator failure. So that staff can detect the potential problems and help regulatory authorities to effectively monitor the lift status. At present, the application of networking technology in the elevator is still in its infancy, it also needs to face the security threats that exist in networking, such as counterfeiting node and information disclosure.This thesis analyzes the elevator operating environment and security issues of Things technology exists in the elevator system and designs an authentication processing solution for elevator system which is secure and efficient. This scheme based on identity information of sensor nodes, using symmetric encryption algorithms for processing. The authentication processing of node is completed by the server without third-party security agencies. In addition, this scheme increases screening node for routing gateways in addition to reduce the burden of the server.In order to test the feasibility of the scheme, this thesis realizes the system. We use sensor nodes to simulate the running data collection of elevator and development on the node secondly. We also complete the development of functions for server, including data encryption, authentication process, data query, and the service website. The operation of the system can validate that the private data in transmission process is encrypted cipher text which any non-authorized user could not know its meaning. Through the background log printed by server, we can view the node authentication process. The illegal node cannot be authenticated and prove that this system can prevent counterfeit node. After logining the system, user can query the information collected periodically by node, so as to achieve the purpose of real-time monitoring.
Keywords/Search Tags:Internet of things, Elevator, Authentication, Encryption
PDF Full Text Request
Related items