Font Size: a A A

Research On Data Security Fusion Technology Of Internet Of Things Awareness Layer

Posted on:2023-01-29Degree:MasterType:Thesis
Country:ChinaCandidate:H XuFull Text:PDF
GTID:2568307061450724Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet of Things technology,more and more intelligent terminal devices have entered people’s daily life and play an important role in the fields of industry,transportation,and medical care.The perception layer network is considered to be one of the necessary components of the current Internet of Things,which is usually composed of a large number of sensor nodes with the characteristics of self-organization,low cost,and limited resources,which are responsible for the perception of the surrounding environment.The network data in the perception layer is characterized by massive amount,and the wireless communication transmission of a large amount of data will bring huge energy consumption.The data fusion technology can aggregate the data of multiple sensors in the perception layer network,saving energy and bandwidth consumption,thereby extending the network life.In the existing Io T perception layer data security fusion algorithms,there are problems that either data confidentiality,integrity and freshness cannot be effectively guaranteed,or the computational and communication overhead is huge.In view of the above problems,the main work of this paper includes the following three contents:(1)Aiming at the problem that the existing data security fusion algorithms cannot take into account data security protection and computational communication overhead,this paper proposes a data security fusion algorithm PEDSA based on homomorphic encryption and digital signatures.The algorithm adopts improved Paillier homomorphic encryption and lightweight ECDSA digital signature technology to ensure confidentiality,integrity and freshness in the process of data transmission and fusion,and reduces the computational overhead of node encryption by introducing combined random numbers.The simulation results show that the algorithm reduces the computational cost of sensor nodes while ensuring data confidentiality,integrity and freshness,and realizes the filtering of false data in the network,reducing the unnecessary consumption of false data transmission,saving communication overhead.(2)Aiming at the problems of single fusion function and limited applicable scenarios in the existing Io T perception layer data security fusion algorithm,a recoverable data security fusion algorithm RPBDSA is proposed.The algorithm fully considers the correlation between the data of nodes in the cluster,compresses the data by using the modulo value coding technology,improves the data recovery processing method,uses the simple ID transmission mechanism to identify the nodes participating in the fusion,and effectively reduces the length of the plaintext code;The encryption technology ensures the confidentiality of the data;the BLS aggregate signature algorithm is used to ensure the integrity and freshness of the data;the base station performs aggregate signature verification in clusters to reduce the loss rate of valid data;finally,the base station can recover the sensing data of each node through data decryption and decoding operations.Simulation results show that the algorithm has lower computational overhead while ensuring security,can adapt to larger network scale,and has lower communication overhead in large-scale network environment.(3)The Io T perception layer data security fusion system based on PEDSA and RPBDSA is designed.The system consists of common nodes,cluster heads and base stations,which can realize key management,data fusion and data recovery functions under different scenarios.Experiments show that the system achieves the expected functions and can resist common external attacks with good security.
Keywords/Search Tags:Internet of Things, Data Fusion, Homomorphic Encryption, Digital Signature
PDF Full Text Request
Related items