Font Size: a A A

Research Of Network Security Based On Narrowband Internet Of Things

Posted on:2021-05-28Degree:MasterType:Thesis
Country:ChinaCandidate:J ChenFull Text:PDF
GTID:2428330614969869Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
The rapid development of network communication technology is driving the application of Internet of Things(Io T)technology to more fields.These emerging applications have higher requirements for the Io T technology,such as massive connections,low cost,low energy consumption and high stability,and existing technologies cannot meet these requirements.Narrowband Internet of things(NB-Io T)is considered to be one of the technologies that can meet these requirements.NB-Io T allows terminal devices transmit data through NB-Io T base stations in a narrowband network.It utilizes technologies such as narrow bandwidth and spectrum enhancement to enhance network coverage and increase device connections.Although NB-Io T has many advantages,the network security are not well considered,resulting in risks such as network attacking,eavesdropping and node impersonation when transmitting data.This thesis designs a NB-Io T based network security strategy for the NB-Io T terminal devices and data transmission.The main research contributions are as follows:(1)In terms of improving the security of NB-Io T terminal devices,this thesis uses edge computing technology and network anomaly detection technology and studies the network anomaly detection method under the edge computing framework and builds an optimal system security and time consumption problem to minimize the global time consumed by anomaly detection system.In the case of meeting the security requirements,this method aims to improve the security of the terminal device by training anomaly detection models in a distributed and parallel manner through edge servers.This thesis designs an effective method to solve the optimization problem.Experiments using classical data sets show that compared with the Support Vector Machine and Multi-Layer Perceptron methods,the time consumption is reduced by 90% and 60%,respectively.The area under the curve(AUC)can reach 0.9 or more,which indicates that the method can effectively reduce the system time consumption and ensure a high detection performance.(2)In terms of improving the security of NB-Io T data transmission,this thesis uses edge computing technology and studies the data offload encryption strategy under the edge computing framework,this method aims to use edge computing to offload data from devices,and then use edge servers to encrypt the data to improve the security of the data transmission.Considering the impact of security,transmission delay and energy consumption,this thesis builds an optimal data security,transmission delay and energy consumption strategy to maximize the security of data transmission.Although the joint optimization problem is a hybrid optimization problem,by analyzing the characteristics of the optimization problem,the layered algorithm proposed in this thesis can accurately obtain the optimal solution of the original problem.Finally,simulations prove that compared with the linear search algorithm,the proposed method can increase calculation speed.Compared with random assignment algorithm,the proposed joint optimization scheme can improve the security of data transmission.
Keywords/Search Tags:narrowband internet of things, network security, edge computing, anomaly detection, offload encryption
PDF Full Text Request
Related items