Font Size: a A A

Research On Node Security Assessment And Access Mechanism In Tactical Internet Of Things

Posted on:2022-04-15Degree:MasterType:Thesis
Country:ChinaCandidate:Q Y QinFull Text:PDF
GTID:2518306557970579Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The Internet of Things technology has developed rapidly in recent years,bringing a lot of convenience to people's production and life,but how to solve safety problems is always a topic that all technologies cannot avoid.Due to the limited equipment resources of the Internet of Things,the large-scale equipment,diversified attacks,and the unstandardized identity authentication,today's Internet of Things still faces many problems.Compared with the civil Internet of Things,in the tactical environment of evacuation,search,rescue and military operations,problems such as unstable communication,more enemy attacks,and greater device mobility have brought greater challenges to ensure the security of the tactical Internet of Things.This thesis mainly conducts the research on the node security assessment and access mechanism in the tactical Internet of Things,and minimizes the loss of resources while fully ensuring the security of the tactical Internet of Things nodes.The main research contents of this thesis are as follows:(1)Aiming at the problem that the complex tactical environment affects the intrusion detection capabilities of the Internet of Things and the encryption and authentication system consumes a lot of resources,this thesis proposes a new node security assessment scheme based on trust indicators,and introduces communication stability as a factor that affects security.Taking into account the impact of multi-hop connections and different levels of equipment on the security of the assessment node,the system's handling measures to deal with unsafe nodes are analyzed.The simulation results show that the scheme can better detect harmful nodes and resist known attacks and greatly reduce the energy loss.(2)Aiming at the problem that the traditional security authentication system in the tactical Internet of Things is difficult to meet the terminal security access requirements,this thesis proposes a new type of terminal security access program.The solution is based on a certificate-less key algorithm and BLS certificate.It analyzes in detail the measures that should be taken when the terminal is disconnected from the gateway,the terminal selects a secure route after moving,the terminal connects to a new gateway,and the gateway is damaged.The simulation results show that this scheme can resist known attacks and solve the problem of lack of trust escrow and mutual authentication in the past tactical IoT terminal access process.The certificate-free key algorithm used in this scheme is better than the algorithms in other documents.High security and less resource consumption,and can weigh the relationship between security and resource consumption.(3)Based on the above-mentioned proposal,a security test platform for the tactical Internet of Things was built,using various sensing devices,Raspberry Pi,servers and other equipment to simulate the real battlefield environment,and design the possible existence of various nodes in the battlefield environment For security issues,the platform verifies the feasibility of using node security assessment schemes and terminal trusted access schemes in the tactical Internet of Things,and can achieve expected functions.
Keywords/Search Tags:tactical IoT, trust metrics, security assessment, certificateless key, secure terminal access, IoT security
PDF Full Text Request
Related items