Font Size: a A A

Research On Privacy Security Access Control In The Internet Of Things

Posted on:2018-11-26Degree:MasterType:Thesis
Country:ChinaCandidate:M HuFull Text:PDF
GTID:2428330620457786Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The application of Internet of things will be more and more widely,to solve the problem of access control problems and stealth security issues,is the field of security research in the field of things a focus for the rapid growth of the Internet of things to provide security.In order to realize the dynamic access problem of a large number of users in the Internet of Things,this paper presents a large number of nodes in the Internet of Things,which are more and more complex in terms of the types of nodes in the Internet of Things.The user presents large-scale irregular dynamic changes,and the limitations of the computational capacity of the nodes are limited and the storage capacity is limited.This paper proposes an access control policy model based on the combination of attribute and role,which has a good security effect on the whole system.Aiming at the possibility of various types of privacy information leakage in the information transmitted in the Internet of Things,a two-way authentication mechanism of the master node and the terminal base station is proposed.In view of the above questions,this paper works as follows:1.This paper analyzes the various access control mechanisms and highlights the shortcomings of some access mechanisms.Considering that traditional access control can not solve the problem of dynamic access to large-scale users.After this analysis,an integrated access control mechanism is designed,which is based on attributes and roles Hybrid access control model,so that the two access model to work together,based on the role of the distribution of attributes before the extraction of user attribute values,and attribute values in the form of data presented by the encryption algorithm to encrypt the data to protect the privacy of data,To protect the user's privacy purposes.After the user is assigned to the role,the different roles will be given different permissions,that is,when the user access to the role of the corresponding authority,where the introduction of the implementation of the authority of the time constraints,to avoid the user long-term possession of the role of resources,resulting in resources The study of mixed access model is studied and analyzed.Experiments show that this is a kind of access control which satisfies the demand and is safe and efficient.2.In order to improve the security of privacy,in the node authentication mechanism of this scheme,we introduce the query-response mechanism in RFID,encrypt the node information by encryption,and securely complete the two-way authentication mechanism of the master node and the terminal base station.The user's privacy,experiments show that the program can verify the legitimacy of the participants and to ensure that the participants upload the confidentiality of the data.To achieve the two sides of the communication on both sides of the certification,compared to just identity ID information to improve the security.We analyze the mixed access control model in this paper.In the windows system environment,the model is simulated by the user to simulate the model of the scheme through the web page.On this basis,the simulation and simulation analysis and model are used to solve the problem Large-scale dynamic changes on the issue,with good performance,the introduction of time constraints a good solution with the increase in user roles on the excessive use of resources,resulting in uneven distribution of resources and waste,so that based on the property control and The role of access control work together to make management more convenient,is consistent with a safe and efficient access control model.Finally,for the privacy of Internet users,we propose a kind of security authentication mechanism,combined with two encryption and decryption,the two-way authentication of the ID of the master node and the security of the terminal base station.Data privacy this piece,in the protection of the Internet of things has made a great help...
Keywords/Search Tags:Internet of things, access control, privacy and security, security protection
PDF Full Text Request
Related items