Font Size: a A A

Research And Application Of Privacy-preserving Technologies For Nodes In Industrial Internet Of Things

Posted on:2022-11-14Degree:MasterType:Thesis
Country:ChinaCandidate:X X WangFull Text:PDF
GTID:2518306770995659Subject:Computer Software and Application of Computer
Abstract/Summary:PDF Full Text Request
The Industrial Internet of Things(IIoT)can be seen as a sophisticated integration of industrial automation systems and the Internet of Things(Io T)systems,using Io T technology to efficiently and conveniently collect and share data in various processes of industrial production for purposes such as industrial production and industrial monitoring.Collection and sharing.Traditionally,the Io T is a centralised and centralised platform,but with the upgrading of the industry,the Io T is facing many problems,especially the various pressures brought by the traditional centralised platform and the privacy protection of nodes when sharing data.How to find a suitable solution to protect node privacy in the industrial Io T,i.e.node user identity privacy in data sharing and data privacy in data transmission,in the application environment of the industrial Io T is an issue worthy of study.This paper combines industrial Io T with blockchain technology to address the problem of node privacy protection in industrial Io T,and constructs a federated chain-based industrial Io T architecture to achieve privacy protection of nodes in industrial Io T data sharing.Specifically,the main research contents and results of the thesis are shown as follows.(1)For the node user identity privacy protection problem in the industrial Io T,a ring signature-based privacy protection scheme for industrial Io T users is proposed.By introducing the identity public key,the node identity is separated from the node user identity,and the identity public key is used for ring signature to achieve user identity anonymity.The data sharing process is managed through smart contracts to sort out the relationship between nodes.Validated from both experimental tests and theoretical analysis,the results show that the user identity privacy protection scheme proposed in this paper can achieve the protection of user identity privacy when data is shared.(2)The privacy protection scheme based on elliptic curve encryption for industrial Io T data is proposed for the privacy protection of node data transmission in industrial Io T.The one-time key idea is combined with elliptic curve encryption algorithm,so that a new elliptic curve encryption key is generated before each data transmission and used for encryption in data sharing,thus reducing the possibility of node data privacy leakage.Smart contracts are also used to enable the transfer of keys as well as data.Finally,experimental testing and effect analysis of the industrial Io T data privacy protection scheme are conducted to further demonstrate that the scheme is secure and feasible.The experimental results show that the two schemes proposed in this paper can each protect node user identity privacy and data privacy during data transmission very well.Node privacy protection during data sharing,node user identity privacy and data privacy protection during data transmission are achieved under the federated chain-based industrial Io T architecture.By studying the privacy protection of industrial Io T nodes,on the one hand,it can protect the privacy of nodes in industrial Io T and promote the industrial upgrading and transformation of industry,which has positive significance to the development of industry.On the other hand,it can accelerate the development of blockchain technology and industrial Io T for better application in human society.
Keywords/Search Tags:industrial internet of things, privacy protection, elliptic curve asymmetric encryption, ring signature
PDF Full Text Request
Related items