Font Size: a A A

Research And Implementation Of Edge Data Processing Security Technology In Industrial Internet

Posted on:2021-05-24Degree:MasterType:Thesis
Country:ChinaCandidate:Z D FangFull Text:PDF
GTID:2428330611997269Subject:Engineering
Abstract/Summary:PDF Full Text Request
The rapid development of the "Internet" has brought people into the era of "Internet of Everything".It's changing people's living habits and also brought changes to the company's production model.On the one hand,the continuous development of the Industrial Internet has greatly improved the productivity and service level of the enterprise.On the other hand,it has made the originally closed industrial control system more and more open.And the variability of the industrial Internet environment has caused system security risks and intrusions.Threats are increasing and network security issues are becoming increasingly prominent,so solving the security issues of the Industrial Internet is urgent.In the security protection architecture of the Industrial Internet,how to ensure the data security from the edge layer data collection model to the cloud platform data storage and solve the edge data security problem has always been the focus of industry research.For data security issues in the cloud,you can rely on the advantages of the cloud to build a complete data security management system;however,at the edge,due to limited resources,limited computing power,and high data real-time requirements,it does not affect the normal operation of edge devices.Under the premise,how to efficiently and reasonably use network security technology to improve the security of edge-end data in the process of collection,transmission,storage,processing,etc.has become the difficulty of current edge-end application research.Aiming at the above problems,this paper designs and implements an industrial edge intelligent terminal security protection system.Firstly,it analyzes the development background of the Industrial Internet and the research status of data security technology at the edge.The main security threats facing the Industrial Internet are analyzed from the perspectives of security vulnerabilities and attack technologies.The main attack technologies and vulnerable points facing each layer in the industrial Internet edge computing architecture system are studied,including the main attack technology principles faced by the device layer,edge layer and network layer.According to the Industrial Internet Security framework in the "China Industrial Internet Security Situation Report(2018)",the core security of the industrial Internet security architecture is data security.Secondly,aiming at how to improve the data security in the industrial Internet security architecture,a hybrid encryption method is proposed to encrypt and decrypt the edge data.To this end,the principles of symmetric cryptography,public key cryptography and keyless cryptography are analyzed and studied.The principles and performance of DES algorithm,3DES algorithm and AES algorithm are compared.The principles of RSA algorithm and ECC algorithm in asymmetric encryption technology are compared.The principles and Implementation process of the SHA-1 hash algorithm.In order to improve the execution efficiency of digital signatures while ensuring its security,the elliptic curve digital signature algorithm used in this paper is improved.Added a random number and the modular inverse operation in elliptic curve encryption and decryption are removed.The algorithm's digital signature and verification signature are improved.Using double private key and double base point methods to improve the security of private keys in digital signatures.Finally,the designed and completed a industrial edge intelligent terminal security protection system.And applied to the industrial edge intelligent terminal "Data Watch 1900".Based on the introduction of the design architecture and hardware components of industrial edge smart devices,the system was tested and analyzed.The experimental results show that the improved elliptic curve digital signature algorithm can effectively improve the efficiency of digital signatures and the security of private keys.The mixed encryption scheme using ECC algorithm and AES algorithm can improve the encryption and decryption speed and security of real-time data.And the encryption and decryption time just make little effect on the real-time data transmission efficiency and low resource consumption,which proves that the data security protection system is feasible at the edge.
Keywords/Search Tags:Industrial Internet, Digital Signature, Double Private Key, Modulo Inversion, Mixed Encryption
PDF Full Text Request
Related items