Font Size: a A A

Research On Trusted Key Management Technology Based On Internet Of Things

Posted on:2022-09-30Degree:MasterType:Thesis
Country:ChinaCandidate:S LiFull Text:PDF
GTID:2518306494971229Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the wide application of 4G and 5G communication technology,the application performance of intelligent terminal device has been steadily improved.The online and offline integrated application based on the Internet and the Internet of things has an important impact on people's production and life forms.With the security transmission and privacy protection of Internet of things being convenient,it has become an important factor that hinders the development of Internet of things.In the process of entering the network,a large number of multi-type Internet of things devices are prone to threats such as eavesdropping,tampering and interception of data,which seriously affect the privacy and security of user personal information.This topic focuses on the data encryption protection of the whole process from the output of data source to the visualization to avoid the practicability reduction and excessive energy consumption problems caused by the use of too complex cryptographic calculation.A comprehensive consideration of data security,transmission efficiency,equipment energy consumption,calculation security and so on is designed,the computing capacity of management scheme is more suitable for the Internet of things without center or weak center.In the design of the Internet of things cryptosystem,the key management which determines its core security is the research focus.Around the data protection of the Internet of things,adds cryptography technology protection in all the links of data,and focuses on the key management in each link.Based on the practical situation of Internet of things,the key negotiation technology is focused on.Guided by the advanced and secure sign key agreement,the semi group properties and chaos properties of Chebyshev polynomials are added.The TSignal key negotiation protocol is designed which is more suitable for the Internet of things environment.The proposed TSignal key negotiation protocol can show that the protocol has complete security attribute and low communication cost through the comparison of security and performance.It provides data security transmission and privacy protection for Internet of things' users,and controls economic cost,and better protects the information security of Internet of things information in the transmission process.At the same time,the paper takes the narrowband Internet of things as an example,and proposes a research scheme of trusted key management technology based on the Internet of things,and puts forward a new idea for the secure and credible application of the Internet of things.
Keywords/Search Tags:Internet of things, key management, key agreement, security
PDF Full Text Request
Related items