Font Size: a A A

Reasearch On Trusted Networking Mechanism For Iot Sensing Nodes

Posted on:2021-02-16Degree:MasterType:Thesis
Country:ChinaCandidate:X Y ZhangFull Text:PDF
GTID:2518306470469154Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the emergence of various attack methods and the development of Io T technology,Io T security has become a research hotspot in the security field at home and abroad.However,the current traditional passive protection mechanism is mainly to remedy after the attack,which has great security risks.Therefore,we must take technical measures to prevent attacks beforehand and effectively filter insecure network nodes,quickly respond afterwards and locate malicious nodes in time.Based on this background,this paper proposes an "active + passive" trusted networking protection mechanism,that is,an active defense mechanism is adopted "in advance" to prevent nodes with untrusted attributes and behavior from accessing the perception network;after networking It is also necessary to identify and eliminate untrustworthy nodes in a timely manner to ensure "after the fact" safety.This new type of "access-network-feedback" hierarchical trusted networking mechanism is mainly composed of three parts: the access judgment mechanism of the sensing node before networking,the networking mechanism,and the feedback control mechanism after networking.The access determination mechanism is mainly to ensure the authenticity and credibility of the identity of the sensing node,and mainly includes a two-way identity authentication mechanism and a trusted measurement scheme for the sensing node.First of all,in view of the characteristics of poor dynamic adaptability of the perception network connection model in the Internet of Things and the single ability to respond to security threats,this paper proposes a two-way identity authentication mechanism applicable to the Internet of Things perception nodes.This mechanism realizes mutual authentication between nodes,avoids the key negotiation process between nodes,and improves the problems of complex traditional authentication protocols,large communication overhead,and low security.Then,based on the dynamic Bayesian network,this paper proposes a dynamic credibility measurement scheme based on the static decision of the nodes and a dynamic credibility metric as the core.This scheme starts from the characteristics of the sensing nodes and the data sending behavior,and introduces an aging factor,effectively improves the sensitivity and adaptability of the model.Next,based on the proposed two-way identity authentication mechanism and dynamic trusted measurement mechanism,this paper proposes a dynamic trusted networking mechanism suitable for the Internet of Things from three perspectives of inherent feature component,variable feature component and energy component,which realizes the logical grouping of sensing nodes and builds a trusted group.After networking,in order to ensure the stable and safe operation of the trusted computing platform after networking,this paper evaluates the sensing node from several levels of the node's trust status,task security level evaluation and the network environment security threat level.A feedback control mechanism from individual to group is proposed to identify and eliminate untrusted nodes in time to achieve a dynamic and trusted balance of the Internet of Things.Finally,from the perspective of correctness and effectiveness of the model,the paper uses an individual-to-whole analysis method to conduct simulation experiments on the trusted networking mechanism proposed in this paper,considering the detection rate of malicious nodes in the sensing network,the proportion of trusted nodes,the success rate of data transmission,and energy loss.Simulation experiments show that the scheme has a low false positive rate and false negative rate of malicious nodes,and can effectively ensure the security of the network in the Internet of Things environment under the premise of various attacks,and at the same time,it can have an acceptable impact on system performance.
Keywords/Search Tags:trusted networking, trusted measurement, identity authentication, feedback control
PDF Full Text Request
Related items