Font Size: a A A

Research And Implementation Of Service Architecture And Security Mechanism Of Home Internet Of Things

Posted on:2021-01-13Degree:MasterType:Thesis
Country:ChinaCandidate:H Y LiFull Text:PDF
GTID:2428330611498254Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Externally The application of the Internet of Things technology in the family scenario is gradually spreading into people's daily life.In the traditional home Internet of Things system,users install application software on PCs or smartphones and other devices and connect to third-party servers through the Internet to achieve home devices.Monitoring and control,this architecture's main problems are:heterogeneous devices cannot be uniformly accessed and cannot be adapted and connected with each other;the development,installation,upgrade and use of application software are inconvenient;the user's private data exists for improper use Risk of use.In view of the above problems,this paper proposes a home Io T service architecture in a private environment,establishes a private Io T server,adds an adaptation layer implemented by software between the network layer and the platform layer,designs terminal device access algorithms,and dynamically Access to a private server and establish an object model for the gateway and the gateway device in memory to achieve uniform access and connectivity of heterogeneous devices,and use the B/S software architecture to develop specific applications at the application layer instead of client application software.Security is very important for home Internet of Things systems,and there is a need for a comprehensive and high-strength security mechanism to ensure system security.This paper studies the security of the system from three aspects: user identity authentication,data transmission security,and data storage security,and attempts to use cryptography to improve system security.Designed user authentication methods that use different authentication strategies based on permissions.More complex encryption strategies are used for users with high permissions and simpler encryption strategies are used for users with low permissions.The goal is to ensure identity authentication under the premise of occupying less system resources.Security.Study the SSL/TLS protocol and propose to configure HTTPS to ensure Internet data transmission security.A file encryption algorithm is designed to ensure the security of the file key,and further improve the system file storage by isolating the encrypted file key and random sequence from the encrypted file safety.This article uses the proposed architecture to design and implement a home Io T prototype system,including four main modules of Io T device management,file download,file upload,user management,and user login,develops Zig Bee network and BLE network,and implements table lamp control,temperature and humidity collection,etc.Useful functions.The adaptation layer is developed using JAVA language to realize the dynamic access and connectivity of Zig Bee and BLE protocol devices.The system has opened up a network interface to support various devices that can connect to the Internet to access through a browser.The system is optimized using Ajax,multi-threading and other technologies.This paper implements the designed security mechanism in the prototype system,including the security authentication of the three identities of administrator,internal user,and external visitor,configures HTTPS on the private server,and implements the designed file encryption algorithm.Finally,the system was tested for functionality and non-functionality,and the system performance was evaluated.
Keywords/Search Tags:Home Internet of Things, Architecture, Security, ZigBee, BLE
PDF Full Text Request
Related items