Font Size: a A A

Research On Secure Access Technologies Of Internet Of Things Based On Consensus Mechanisms

Posted on:2022-02-18Degree:MasterType:Thesis
Country:ChinaCandidate:X F DuFull Text:PDF
GTID:2518306332467364Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
The current device access solutions for Internet of Things(IoT)mainly rely on an open network architecture,and there are certain security vulnerabilities such as privacy leaks,vulnerability to various attacks.However,the limitation of computing and storage resources has prevented the comprehensive feature encryption and multi-factor authentication in many Internet of Things(IoT)access solutions.In order to promote the secure access of IoT devices,this thesis has carried out research on consensus mechanisms,authentication protocols,secure access to the Internet of Things,edge computing,etc.This thesis proposes a point-to-point authentication algorithm based on proof of work,and uses the advantages of edge computing to propose an one-time multi-tasking distributed edge security model to achieve efficient and secure access to IoT devices.The main work and innovations of this thesis is as follows:1)Propose a point-to-point authentication algorithm based on proof of work.Based on the proof-of-work consensus authentication algorithm,in view of the limited computing power and resources of the edge computing devices of the Internet of Things,the authentication algorithm is optimized and improved to make it suitable for authentication access in the Internet of Things.And propose a method of asynchronous and secure distribution based on the cloud,which decoupling weakens the connection between the key and authentication,allowing the consensus authentication process to be completely de-networked,allowing local offline authentication calculations,increasing authentication security,and allowing the authentication process to focus on calculations rather than network communications.2)Propose one-time multi-tasking distributed edge security model.According to the above algorithms and methods,a secure channel from the point to the center in the Internet of things is established,and a multi-tasking set is established based on the selection of related NP problems.Through the intelligent edge device management,the trust relationship and anonymity in the Internet of things are established,and the authentication process is decentralized,so that the Internet of things devices can easily perform multi-tasks verification and secure access.3)Based on the above model method,design edge security model experiments.Design an intelligent consensus lock system,and complete experiments based on relevant indicators,and verify the edge security center model.The experimental results show that the dynamic difficulty strategy and concise point to point verification prove that the edge security model has the advantages of excellent performance,wide application scenarios,and high security,which is better than traditional authentication methods.In summary,the proposed one-time multi-tasking distributed edge security model is a secure access technology of Internet of things based on consensus mechanism.Compared with the current access methods that need to extract biometric authentication information and network control,it has the advantages of better verification performance,high security and simple hardware requirements.
Keywords/Search Tags:consensus mechanisms, Internet of Things, edge computing, secure access
PDF Full Text Request
Related items