Font Size: a A A

Research On Trusted Access Technology Of Wireless Sensor Network In Cloud-edge-device Collaboration Mode

Posted on:2023-06-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z M SongFull Text:PDF
GTID:2558306845490474Subject:Communication Engineering (including broadband network, mobile communication, etc.) (Professional Degree)
Abstract/Summary:PDF Full Text Request
With the large-scale deployment of the Internet of Things such as wireless sensor networks,the amount of data has exploded,and cloud-edge-device collaboration can quickly process data and make decisions locally.However,in practical application scenarios,there are still data security problems in wireless sensor networks,mainly in the following two aspects:(1)In existing wireless sensor networks,malicious nodes use aggressive networking to allow invalid data to flow(2)In the actual production environment,the external device pretends to be the cluster gateway,and the data is easily intercepted during the upstream process,making the data in the network at risk of leakage.First of all,for the first aspect,deploy asymmetric encryption technology to the wireless sensor networking process,optimize the trusted authentication process in the existing networking mechanism,sensor nodes can identify malicious nodes in time during the networking process,and improve the security of wireless sensor network;for the second aspect,a trusted access mechanism of the cloud edge gateway is designed and implemented,which ensures the security of the sensor data inside the gateway cluster,and completes the centralized management and control of the gateway cluster by the server.In order to realize the trusted access of the wireless sensor network,the related work is completed in the cloud-side-terminal collaborative architecture with a four-layer structure.The overall architecture consists of a data collection layer,a basic service layer,an application scheduling layer and a cloud-side interaction layer.Next,in the data collection layer,the IWSN protocol developed by the project team in the early stage is optimized,and a key information verification module is added to verify the encrypted information of the upper layer and downlink to complete the trusted network access of the sensor nodes.In the basic service layer,the sensor node security authentication and protocol conversion services are added;the storage of asymmetric keys is redesigned and realized,and the database service is enabled to complete the storage of trusted access keys;at the same time,the communication between different communication protocols is realized conversion.In the application scheduling layer,the gateway cluster is deployed in a distributed manner,and a distributed trusted network access scheme is proposed;in this layer,the distributed storage of files such as key data is designed and implemented.In the cloud-edge interaction layer,the storage of sensor data and the management and control of the trusted access gateway are designed and implemented;in this layer,the sensor data in the message queue is written to the file for storage;at the same time,the server-side dynamic Monitor trusted gateways.Finally,the above four levels were tested respectively,and malicious nodes and edge gateways were arranged for trusted access to the wireless sensor network,and the sensor data uploaded by the trusted gateway was read and written.The test results prove that the proposed scheme realizes the trusted access of gateways and sensor nodes,enhances the security and robustness of cloud-side wireless sensor networks,and is of great significance to the development of cloud-side-terminal networks.The cloud-side-terminal collaborative wireless sensor network trusted access scheme implemented in this paper has been deployed in the actual application environment,and the storage method of trusted keys will be further optimized and further studied in the follow-up.
Keywords/Search Tags:cloud-edge-device network, trusted access, asymmetric encryption, distributed network
PDF Full Text Request
Related items