Font Size: a A A

Research On Key Safety Technologies Of The Mobile Target Positioning And Tracking System For Group Customers

Posted on:2020-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:J Y SuFull Text:PDF
GTID:2370330620956213Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the development of the Global Positioning System(GPS)in the era of information technology,GPS technology is used for civil purpose in recent years,which causes a variety of applictions of location-based services(LBS)come into use.In our life,common LBS applications like the mobile target positioning and tracking system have been widely used in various fields,including bicycle sharing,car rental,vehicle navigation,children watch,electric vehicle tracker,etc.The old mobile target positioning and tracking system is implemented through the point-to-point approach,and the current mobile target positioning and tracking system is implemented through the system platform.However,the phenomenons of illegal parking,electric vehicle thefting and illgal flying of UAV in real life have become increasingly serious,which indicates that the existing mobile target positioning and tracking system is not of effectiveness to monitor and manage the mobile targets.With the advent of the era of big data and the frequent occurrence of massive information leakage in recent years,corporations lay more emphasis on data security.Meanwhile,users pay more attention to privacy protection.Nevertheless,there exist many problems concerning data permission management and data synchronization for the current mobile target positioning and tracking system.In this thesis,we do research on three key technologies based on the current mobile target positioning and tracking system,which are the secure electronic fence technology for the arbitrary irregular graphic region,the hierarchical secure access control technology oriented to group customers and the secure data mirror technology with the function of key agreement.As for the secure electronic fence technology for the arbitrary irregular graphic region,it solves the problem of the supervision of mobile targets.In this technology,we provide supervisors with the function of drawing the arbitrary irregular region of the electronic fence in the electronic map,and then supervisors can monitor the positions of mobile targets.As for the hierarchical secure access control technology oriented to group customers,it solves the problem of data permission management.In this technology,we provide the secure access control mechanism when users attempt to access data,so that users can only access authorized data.As for the secure data mirror technology with the function of key agreement,it solves the security problem of data synchronization.In this technology,we use key agreement algorithm and encryption and decryption algorithm to ensure the security of the transmission process of mirror data.The main contributions of this thesis are as followed:Firstly,we design and implement the secure electronic fence technology for the arbitrary irregular graphic region.By researching the horizontal ray algorithm and the basic concepts of the point coordinate and the connected region,we improve the horizontal ray algorithm.The improved algorithm can judge the relative position between the mobile target and the arbitrary irregular graphic region,and solve the problem that the original horizontal ray algorithm may make mistakes if the mobile target appears at certain special positions such as boundary points.After that we design and implement the schemes of the database,the system back end and the group client for the secure electronic fence technology for the arbitrary irregular graphic region based on the improved horizontal ray algorithm.Secondly,we design and implement hierarchical secure access control technology oriented to group customers.First of all,we propose the flexible organization structure of group customers.After that by researching the related basic knowledge of BLP and RBAC security models,we propose a combined model of BLP and RBAC,which is of high security and flexibility in data permission management among group customers.In this model,we use BLP model to ensure "read data of lower levels and write data of upper levels",realizing the vertical management of data.And we use RBAC model to ensure that the data is accessed by designated roles,realizing the horizontal management of data.And then we design and implement the schemes of the database,the system back end and the group client for the hierarchical secure access control technology oriented to group customers based on the combined model of BLP and RBAC.Thirdly,we design and implement secure data mirror technology with the function of key agreement.First of all,we propose the customized key agreement algorithm based on Diffie-Hellman(DH)key agreement algorithm and third-party authentication technology,which ensures the security of key agreement.After that we propose the secure data mirror technology with the function of key agreement based on the customized key agreement algorithm,MySQL master-slave replication,SM4 algorithm and Cipher Block Chaining(CBC)mode,which realizes secure data synchronization.In this technology,we use MySQL master-slave replication to complete data synchronization.And we encrypt mirror data based on the customized key agreement algorithm and SM4 algorithm,so that the security of mirror data can be ensured.And then we design and implement the schemes of the database and the system back end for the secure data mirror technology with the function of key agreement.Fourthly,we test and analyze key safety technologies of the mobile target positioning and tracking system.First of all,we test the secure electronic fence technology,which includes the applicability and the accuracy of judgement of the improved horizontal ray algorithm and the client function of the secure electronic fence.The result shows the improved horizontal ray algorithm can be applied to the arbitrary convex polygon and the arbitrary concave polygon.Compared with the original horizontal ray algorithm,the accuracy of judgement of the improved horizontal ray algorithm has been increased from 95% to 100%.And the client function of the secure electronic fence performs well with the accuracy over 95% and excellent compatibility among mainstream browsers.What's more,we test the hierarchical secure access control technology,which includes the reading and the writing accuracy of permission determination and the client function of the hierarchical secure access control.The result shows the reading and the writing accuracy of permission determination can both reach 100%.And the client function of the hierarchical security access control performs well with the accuracy over 95% and excellent compatibility among mainstream browsers.After that we test the secure data mirror technology,which includes the accuracy of data synchronization,the success rate of key agreement and the success rate of SM4 encryption and decryption.The result shows the accuracy of data synchronization,the success rate of key agreement and the success rate of SM4 encryption and decryption can all reach more than 99.8%.
Keywords/Search Tags:the arbitrary irregular graphic region, the secure electric fence, group customers, hierarchical secure access control, secure data mirror
PDF Full Text Request
Related items