Font Size: a A A

Transmission Security Model And Implementation Of Internet Of Things Based On Blockchain

Posted on:2022-06-14Degree:MasterType:Thesis
Country:ChinaCandidate:K A ZhuFull Text:PDF
GTID:2518306557471464Subject:Logistics Engineering
Abstract/Summary:PDF Full Text Request
With the rise of Internet of things industry,in the past few years,the global Internet of things market has grown rapidly,and a large number of Internet of things devices will gradually enter our lives.The Internet of things system is complex,and the data will pass through different carriers in the whole transmission process.The privacy data security problems of the Internet of things have attracted people's attention.Therefore,it is particularly challenging to protect the data security of the Internet of things.This paper aims to study the security model of Internet of things data transmission based on blockchain technology,to construct the identity authentication of equipment nodes,to establish a secure communication channel between block nodes,and to ensure the security of Internet of things information.This paper designs a hybrid architecture of the Internet of things based on blockchain.The architecture diagram is designed and developed according to the current situation of the transmission of the Internet of things.It is believed that the Internet of things will become a part of the future urban life.Different from the traditional centralized C-S structure of the Internet of things,the traditional structure of the Internet of things is based on the existing Internet environment,while the hybrid architecture of the Internet of things based on blockchain technology integrates a series of blockchain technologies,such as distributed system,hash algorithm,Merkel tree,digital signature,P2 P network,to ensure the security of data.In the Internet hybrid architecture based on blockchain,the first layer is the asset layer,the user's equipment will be connected to the physical assets,and the user's physical asset status data will be sent to the cloud back end,which is the second layer.The cloud back end will host all the necessary security services and other services to manage the user's IOT solutions.The third layer is the blockchain layer,which is used to store different types of applications Using the relevant data of program assets,the hybrid architecture makes the cloud and blockchain together to form a very powerful back end to support IOT applications and integrate the blockchain into the IOT ecosystem.The traditional centralized platform of Internet of things has the problems of high security risk coefficient and poor compatibility in equipment identity authentication.Aiming at these disadvantages,this paper proposes a node identity authentication mechanism based on original gossip algorithm.The information of Internet of things access devices is stored in the block data structure through the intelligent gateway.The consensus algorithm will analyze and process the information,register and authenticate the terminal devices,and then add them to the main chain.The identity authentication of Internet of things devices includes the knowledge of cryptography.In the consensus algorithm part,the identity authentication mechanism of Distributed Internet of things devices based on blockchain technology is proposed,and the detailed process of digital certificate issuance and identity authentication is introduced in the fourth part of the paper.In order to ensure the data integrity and the accuracy of data traceability query on IOT devices,checkpoints are set at different device nodes to build Merkle tree,and checkpoints are used to manage smart contracts to verify the integrity of data.Users can verify whether the data has been tampered according to the root hash value of Merkle tree.When users retrieve data from local SD card or remote cloud storage,it can be very convenient Easily verify whether the data has been tampered with.The identity authentication mechanism based on original gossip algorithm and the traceability query based on Merkle tree have the characteristics of high security coefficient and strong anti attack,which can realize the highly secure identity authentication of Distributed Internet of things.It plays an important role in privacy data protection,and has certain advantages in performance.
Keywords/Search Tags:Internet of things, blockchain, information security, Merkle tree, gossip consensus algorithm
PDF Full Text Request
Related items