Font Size: a A A

The Research And Implementation Of Trusted Communication For Remote Control Of The LED Display

Posted on:2018-08-22Degree:MasterType:Thesis
Country:ChinaCandidate:Z LiangFull Text:PDF
GTID:2428330569485348Subject:IC Engineering
Abstract/Summary:PDF Full Text Request
With the introduction of network communication technology,the LED display control system has transformed from the original local and one-on-one control mode into a cluster control mode based on the cloud server,this shift greatly satisfies the needs of consumers for remote control over LED display.The introduction of network communication technology brings in convenience,while at the same time has incurred security problem,how to guarantee the communication reliability and security of the remote control system has become a research emphasis.This paper focuses on the implementation of trusted communication in the remote control system of LED display,analyzing the characteristics and summarizing the requirements of the system.After studying the existing trusted communication techniques,the identity authentication and data encryption techniques are emphatically researched.In this paper,a kind of authenticated key agreement communication scheme is designed,this scheme adopts a one-time password(OTP)authentication technology based on asymmetric encryption algorithm,realizing the mutual trust of the client and the server,and delivering the symmetric session key in the process of certification,ensuring the confidentiality of the follow-up communication data.The solution conforms to the requirements of the system and meets the basic requirements.This paper shows that the two communication parties can make effective authenticate connection and negotiate about the encryption key by carrying on the simulation test for reliable communication scheme.And then,compares the client and server data transmission process before and after the use of this scheme by getting the network data through WireShark,it comes to that the data transmission process transforms from plaintext into the encrypted,and ensures the safety of communication data.After theoretical analysis of the scheme,it comes to that the security classification of the connection process and the communication process can reach 80 bits and 128 bits.Finally,by analyzing and comparing with two other identity authentication schemes,the authentication procedure of this scheme is more simple and the scheme can effectively defend hacking attack,replay attack and fake attack without the requirements of resetting password or keeping time synchronization.
Keywords/Search Tags:LED display, Trusted communication, Identity authentication, Asymmetric encryption algorithm
PDF Full Text Request
Related items