Font Size: a A A

Research On Security Management Of Internet Of Things Equipment Based On Blockchain Optimization

Posted on:2022-10-02Degree:MasterType:Thesis
Country:ChinaCandidate:H Z YangFull Text:PDF
GTID:2518306488460184Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the world today,the popularity of the Internet and the demand for a smart society are increasing day by day.As an emerging technology with very broad development prospects,the Internet of Things technology has become an important driving force for the economic development and technological development of various countries around the world.Although the significance of the Internet of Things is to make various items in real life more intelligent,so that any item can be interconnected and intelligently linked at any time and in a scene.However,in real applications,because most of the Internet of Things devices use centralized cloud servers for data transmission and do not have a sufficiently secure authentication mechanism,the data privacy security of users and devices depends on the security protection measures of the central cloud server.In the actual application scenarios of distributed massive nodes,fragmented data,and frequent information transmission,the centralized cloud server architecture will cause huge basic information network construction and subsequent maintenance costs.At the same time,the user's personal privacy data also has various uncertain information leakage security risks in the communication network.When this centralized management mechanism is faced with a large number of connections,it needs to provide stable and secure guarantees.Consumption of large amounts of resources and extremely serious security threats.Therefore,this article mainly uses the national secret SM2 algorithm and the ring signature algorithm to improve and optimize the current blockchain encryption algorithm,and proposes an innovative RSSC smart contract to make a more secure and reliable blockchain pass timestamp and information encryption and consensus mechanisms and other technical means,in a distributed Internet of Things system without a trusted environment,realize secure and trusted decentralized point-to-point communication,secure transmission and privacy protection.Thus,it provides a solution to solve the problems such as the difficulty of trust,the difficulty of data secure transmission and the difficulty of privacy protection that are common in the current centralized Internet of Things system.The main research work and results of this paper are as follows:(1)Research and analyze existing security access mechanisms for Io T devices.Analyze the current definition of the Internet of Things and the blockchain and the architecture used,and at the same time study in detail the cryptographic algorithms and smart contract technology used by the blockchain,and analyze the security risks faced by existing Internet of Things devices and the corresponding Security access mechanism,discusses the security access mechanism of Io T devices based on blockchain,and makes corresponding analysis on the application of blockchain security protection technology in the Internet of Things that needs improvement.(2)Design and propose a blockchain system optimized based on SM2 national secret algorithm.Aiming at the problem that the ECDSA public key signature algorithm used in the current blockchain system has hidden risks of backdoor security,a blockchain design that uses the SM2 national secret algorithm to replace the ECDSA public key signature algorithm is proposed.In addition,in order to break through the more complex elliptic curve calculations and the high time complexity performance bottleneck of the algorithm,the core encryption process of the algorithm is optimized without affecting the security of the algorithm itself,and the design is based on known random values.Sequence optimized SM2 algorithm,and complete the blockchain design based on optimized SM2 algorithm.Simulation experiments and analysis were carried out on the optimized national secret algorithm and blockchain system,which proved the effectiveness of the optimized national secret algorithm and the efficiency of the blockchain system.(3)Propose a method for storing and managing information of Io T devices based on blockchain optimization.Aiming at the problem that the current blockchain network transaction data information is completely open and transparent,which causes the identity and privacy information of both parties to the transaction to face major security risks,a smart contract scheme based on ring signatures is proposed.By invoking the ring signature algorithm during the transaction,the identity of the transaction initiator is authenticated,so that the identity of the sender is hidden in a set of public key rings,allowing users to achieve the purpose of anonymous transactions on the blockchain.Furthermore,the smart contract based on ring signature is applied to the on-chain storage link of Io T device data information,and its related functions are experimentally verified and analyzed to prove that the solution is feasible and can effectively achieve the safe storage and management of Io T device data information.(4)Designed and implemented a blockchain-based Io T device data information security management platform.Integrating the optimized national secret algorithm and the application research results of the privacy and security ring signature technology in the blockchain,we designed and implemented an Io T device data information security management platform based on the underlying technology of the blockchain.The functional modules of the platform were tested.The results show that the platform can stably realize the protection of data and information security of Io T devices,and has good performance and certain practical value.This research has enhanced the strength of blockchain technology in data encryption and privacy protection to a certain extent,and realized the security protection and management of data information of Io T devices based on blockchain,with the purpose of proposing safer and more reliable information.The protection method provides strong basic theory and scientific research practice support for the development of safe and reliable applications and innovative platform design in the field of Internet of Things,which has certain practical significance and application value.
Keywords/Search Tags:Internet of Things, Blockchain, National Cryptographic Algorithm, Ring Signature, Smart Contract
PDF Full Text Request
Related items