Font Size: a A A

Research On Threat Detection And Protection For The Internet Of Things In Home

Posted on:2018-07-16Degree:MasterType:Thesis
Country:ChinaCandidate:X MaFull Text:PDF
GTID:2428330623950788Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In the era of Internet of Things,all devices will have a built-in smart chip and intelligent OS,all devices can communicate through a variety of network protocols,and are connected to 7x24 hours.Due to the size and weight limitation of the equipments,most of the IoT devices are low-energy with limited computing resources and storage resources.These devices must devote most of their available energy,computing resources,and storage resources to core application functionality,which makes the protection of security and privacy protection resources in IoT equipments are very limited.In the background of all things inconnected,network equipments on the Internet may have security vulnerabilities.Firstly,this thesis studies the security mechanism of the Internet of things equipment for home,and puts forward the security requirements in view of the security threats and the existing security vulnerabilities.Then,based on the safety requirements of IoTs,the basic idea of security protection is put forward,and a multi-dimensional and multi-level security protection framework is built.Finally,under the framework of security protection,we have researched and implemented the firmware security bootloader technology,lightweight threat traffic awareness technology and whitelist security detection technology for home IoTs.In the end,the experiments show threat protection technology is proposed in this paper can effectively interrupt buffer overflow vulnerability,XSS vulnerabilities,permission to bypass vulnerability and sensitive information leakage vulnerability attacks using process,thereby reducing the security threats,effectively improve the level of safety of home networking equipment,enhanced home networking security equipment.Reduce things may bring to people's life and social functioning threat.The development of the Internet of things equipment and research has practical significance.
Keywords/Search Tags:Internet of Things, Vulnerability, Threat Detection, Whitelist Technology, Safe Boot Technology
PDF Full Text Request
Related items