Font Size: a A A

Research On Condition Monitorin And Security Protection Technology Of Information Centric Internet Of Things

Posted on:2021-12-09Degree:MasterType:Thesis
Country:ChinaCandidate:L Q CuiFull Text:PDF
GTID:2518306503973379Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the "smart city" construction,in recent years China's urban construction and informatization application technology level has continuously improved,and the amount of information generated by the Internet of Things has continued to increase.How to distribute and process massive amounts of information faster and more efficiently is a very important issue at present.In this sense,the Information Center Network(ICN)is designed to meet the growing demand for efficient content distribution.Unlike the typical IP-based request mechanism,the information generated in the Internet of Things can be considered as content.Associating the Internet of Things content with the name enables users to directly request the content they really want.In addition,ICN's unique intranet cache mechanism and features such as multicasting help speed up data retrieval and reduce congestion.The concept of information-centric Internet of Things(IC-Io T)has been proposed.They believe that the next generation of industrial networks will be an information-centric and service-oriented model.Although there are many researches on the routing and caching mechanisms of the ICN itself,the problem of node monitoring in ICN has not received much attention.In order to manage the constantly changing network environment and diagnose the causes of abnormalities inside the network,network managers must obtain and analyze network status information from monitoring tools.However,traditional network monitoring methods are not suitable for content-centric IC-Io T.For a long time,the most commonly used protocol in traditional network management is the simple network management protocol.As the next-generation Io T will abandon the IP-centric protocol stack structure and move towards information-centric.The traditional simple network management protocol still works based on the TCP/IP protocol,and will certainly not be suitable for content-centric network management.Therefore,this paper proposes a network node status monitoring scheme in IC-Io T based on the principle of the simple network management protocol to better adapt to the future network development.Based on the above problems,the main work of this paper is as follows:1)This paper proposes a new management information database structure for recording various network node status information and adopts ICN naming format.2)On this architecture,this article uses a tracking method to obtain the required network status information.When the management station sends a status data interest packet to the agent station,each data block has a data tracking table to store the past request records.which is used to locate the required state data.3)This paper proposes an adaptive data placement strategy based on the importance of the data block,so that the information with higher importance will be closer to the management center for more effective acquisition.4)Concerning the data content itself is the most essential difference between information center network and traditional IP network.Therefore,when designing the security protection mechanism in the network node status monitoring scheme,this article also hopes to establish the trust between the network management station and the agent based on the content name,ensure the confidentiality of the data through encryption,and achieve the purpose of access control by limiting access time of the management user,while using hash chain to effectively reduce the authentication overhead,fully considers the request continuity of the management user.5)Use network simulation test environment to evaluate the delay effects caused by the above-mentioned tracking mechanism,adaptive data placement strategy,and access control security protection.The simulation results show the feasibility of the proposed scheme.
Keywords/Search Tags:Information-centric network, Internet of things, node status monitoring, access control
PDF Full Text Request
Related items