Font Size: a A A

Research And Implementation Of Nodes Secure Join Mechanism For 6TiSCH Network

Posted on:2019-10-23Degree:MasterType:Thesis
Country:ChinaCandidate:Q Y PangFull Text:PDF
GTID:2428330590965825Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of industrial Internet of Things,the problem of shortage of address resources has become increasingly prominent.IPv6 technology allows each device to have an address.Enable industrial devices to support IP is the current research hotspot.The 6TiSCH network(IPv6 over the TSCH mode of IEEE 802.15.4e)discussed in this document is IPv6 based industrial wireless standard,which is being promoted by the IETF working group.This standard can well meet industrial wireless networks requrements of the reliability and low power consumption.6TiSCH networks are more vulnerable to attacks than wired networks because 6TiSCH networks are transmitted over by wireless media.Meanwhile,with the limited resources of 6TiSCH network nodes,it is crucial to solve 6TiSCH security problems for its potencial large-scale application.The node security join problem is the trusted foundation of the 6TiSCH network.The IETF working group has proposed several draft standards for the node security join mechanism of the 6TiSCH network.This thesis will refer the current IETF working group documents and draft standards to design a secure network join mechanism for the 6TiSCH network.The main work of this thesis is divided into the following four aspects:1.According to the 6TiSCH characteristics and requirements described in the existing 6TiSCH related standards and working group documents,the key technologies of 6TiSCH network such as time synchronization,TSCH access mode and RPL routing are analyzed in detail.The security framework and requirement of 6TiSCH network is also analyzed.2.Refering working group draft and internet draft from IETF 6TiSCH working group,a secure node join mechanism for 6TiSCH network is designed and implemented.By using pre-share key,Object Security for Constrained RESTful Environments and the CoAP,new nodes can join the network by monitoring enhanced beacon frames to complete the authentication and to establish secure session channels.3.A novel secure join method based on data aggregation is proposed to solve the collision problem while multiple 6TiSCH network nodes joining the network at the same time in a shorter time window.A join proxy encapsulates multiple 6TiSCH requests in a secure request data frame,effectively reducing the cost of the join request message.4.The 6TiSCH testing system based on CY2420 is firstly built to test and verify the above mechanism.The test results are analyzed.The test results show that the 6TiSCH security testing platform based on CY2420 implements the network security mechanism that is consistent with the current standard draft of 6TiSCH working group.As well as,an optimized multi-node network join scheme is implemented.The feasibility of the proposed scheme is verified.
Keywords/Search Tags:Industrial Internet of Things(IIoT), 6TiSCH, Node Join, CY2420
PDF Full Text Request
Related items