Font Size: a A A

Research And Implementation Of The Runtime Verification System For IoT Service System

Posted on:2019-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:K ChenFull Text:PDF
GTID:2348330545455581Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the IoT(Internet of Things),the IoT service system brings convenience to people as well as great security risks.The system needs more security during operation.Existing runtime verification schemes are often embedded in the IoT service system,which cannot be reliably guaranteed because of lack of corresponding isolation when the system is invaded.This paper describes a runtime verification system based on high security virtualization technology that deploys IoT service systems in virtual machines.By controlling the communication channel between the virtual machine and the outside world,IoT service system operation events are extracted from the perspectives of network,serial port and memory,and the events are fused from multiple sources.Then event verification is carried out.Finally,the service system is fed back according to the security policy.The innovation of this paper lies in the fact that the event is collected outside the service host and is transparent to the service itself.It is highly isolated and has higher reliability when the IoT service system is compromised.Above this innovative fusion of multiple sources of extracted events,a series of event fusion verification and event duplication,omission coping algorithms,to solve the runtime authentication system and the Internet of Things service system to separate the event acquisition is not accurate problem.Finally,this paper combines the theorem proving and runtime verification,and realizes the state machine transfer verification by instantiating state machine node variables at run time,which avoids the efficiency problem of traditional static model testing.In this paper,a variety of tests and experiments are used to verify the reliability and efficiency of the method described in this article.
Keywords/Search Tags:Internet of Things, runtime verification, virtualization, transfer verification
PDF Full Text Request
Related items