Font Size: a A A

Research On Resilient Access Management Of Mobile IoT Devices

Posted on:2022-04-23Degree:MasterType:Thesis
Country:ChinaCandidate:X HuangFull Text:PDF
GTID:2518306731487734Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Nowadays,IoT-related technologies are developing rapidly,and the functions and performance of smart terminals such as smart wearable devices and smart phones are ushering in a spurt of development.It is precisely because of this that the complexity,diversity and complexity of the business categories related to the Internet of Things Mobility is more demanding,and the data traffic generated by it also shows explosive growth.The location distribution of mobile Internet of Things terminals is usually scattered,which leads to the dynamic and dynamic flow of network partitions.Unbalanced characteristics.In the face of this situation,there is currently no model for processing mobile Internet of Things terminal services,and the traditional centralized big data processing model is no longer able to flexibly and efficiently process the data generated by these terminal mobile Internet of Things devices.Especially in terms of access control and dynamic allocation of access points for mobile Internet of Things devices,traditional mobile access control systems face: a.The centralized controller is far away from the Internet of Things terminal;b.The identity of the Internet of Things terminal Insufficient verification and monitoring;c.The data access efficiency of mobile IoT terminals is inefficient.In order to meet the above challenges,this thesis designs an effective mobile IoT flexible access management solution:(1)This thesis adopts the Edge-IoT terminal(Edge-IoT)solution.The mobile edge computing processing mode is adopted to sink the server to the edge of the network,making it closer to the user terminal side,and at the same time to push the software-defined network to the edge,combining the two to manage IoT devices.In order to reduce the inherent delay from the mobile terminal to the cloud,the data request service of the IoT device can be processed more efficiently through the controller;(2)This thesis adopts a device authentication mechanism that introduces the location group information of mobile Internet of Things devices and combines it with the Diffie-Hellman key agreement algorithm.Collect the location group information of mobile IoT terminals in the network partition by the controller deployed at the edge,and combine it with the Diffie-Hellman key agreement algorithm to perform location authentication and access control operations on the network partition where the mobile IoT device is located,To solve the problem of insufficient identity verification and monitoring of mobile Internet of Things devices;(3)Based on Lyapunov's optimization theory,this thesis proposes the design of access point allocation plan.This thesis combines Lyapunov optimization theory to design and analyze a communication model based on Edge-IoT,and mathematically analyze and derive this communication model,and design an access point allocation plan to ensure that each new mobile IoT device entering the network partition is consistent with the current state of the art.The optimal access points are associated to improve the data access efficiency of mobile Internet of Things devices,and at the same time,the resources of the access points of the network partition are allocated and scheduled reasonably to ensure the stability of the entire network partition.Finally,the scheme of this thesis is verified by experiments on a simulation platform.The experimental results show that the scheme adopted in this thesis can provide secure verification for the access of mobile Internet of Things devices,and the designed online resource scheduling scheme can ensure that the traffic request between each mobile Internet of Things device and access point pair is The current best allocation plan improves resource utilization and ensures the stability of network partitions.
Keywords/Search Tags:Edge Computing, Software Defined Network, Access Control, Lyapunov Optimization, Resource Scheduling
PDF Full Text Request
Related items