Font Size: a A A

Research On Trusted Computing And Privacy Protection Method Of Internet Of Things Node Based On Blockchain

Posted on:2020-11-05Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiuFull Text:PDF
GTID:2428330575471524Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In recent years,the internet of thing technology and its innovative applications have developed rapidly in the fields of intelligent manufacturing,smart home,smart city and so on,which have changed the original production mode and brought unprecedented convenience to people's lives.However,ubiquitous object-material interconnection and human-material data exchange also impose higher security requirements for the collection,transmission and exchange of sensitive information;and hyper-large-scale concurrent data caused by data exchange of massive nodes of the Internet of Things.Handling requirements is a huge challenge to the ability of existing data centers to compute,store and stabilize services.Blockchain technology with decentralized computational features naturally provides a solution to the problem of high concurrency.However,in terms of sensitive information security,there are two key issues to consider when applying blockchain technology: 1)Trusted computing problems of IoT nodes in data transmission,sharing and processing in a non-trusted environment;2)Massive Internet of Things data privacy and security when information is exchanged frequently between nodes.In view of the above problems,this paper proposes an information security solution for IoT nodes based on blockchain from the aspects of trusted computing and privacy protection.The main contributions and innovations of this paper are as follows:1.In the aspect of trusted computing,two types of models are proposed: The methods of malicious nodes detection for existing wireless sensor networks cannot guarantee the fairness and traceability of the detection process.We proposed blockchain trust model for malicious nodes detection in WSNs,which combines smart contracts and WSNs four-side positioning methods to detect and distribute malicious nodes in three-dimensional space.The consensus results of the voting are recorded in the blockchain.Not only can the malicious nodes in the WSNs be effectively detected,but also the traceability of the malicious node detection process is ensured;Aiming at the problem that the exchange waiting time is too long in the typical scenario of non-critical data exchange in the Internet of Things,a delay control petri nets model is constructed and a real-time exchange strategy for frequent exchange of non-critical data with blockchain is proposed.Through the quantitative evaluation of the originator credit of the data exchange,the credit endorsement is selectively carried out,and the delay can be effectively controlled in the "high frequency,non-critical" data exchange,and the authentication efficiency of the non-critical data frequent exchange is improved as a whole.2.In terms of privacy protection,a smart home system based on paillier encryption blockchain is proposed for the exchange of sensitive data of intelligent devices in edge computing scenarios.Then a new data block structure is defined to record the data exchange process.Finally,a homomorphic encrypted blockchain privacy protection algorithm is designed.By implementing homomorphic encryption and distribution protection mechanisms for sensitive data of users,it provides a more secure privacy guarantee for data exchange between intelligent devices for edge computing.
Keywords/Search Tags:blockchain, trusted computing, privacy protection, internet of things, wireless sensor network, homomorphic encryption, petri
PDF Full Text Request
Related items