| The forest Io T is an Internet of Things(Io T)system deployed in the forest scene.Compared with the common Io T,it has more unique network and environmental characteristics.The current security mechanisms such as trust evaluation and trust architecture are not fully applicable to the forest Io T.This dissertation makes an indepth study on the security mechanisms of the forest Io T.With the development of intelligent hardware,sensor networks and other technologies related to the Io T,the advantages of low cost and flexible function deployment of the Io T system have become increasingly prominent.In the forest-related fields such as smart forest and environmental monitoring,the deployment of the Io T system has saved a lot of manpower and material costs,but it also brought many problems,such as privacy leakage,data loss,equipment damage,serious environmental interference and so on.Therefore,it is of great significance to study the trust evaluation mechanism of the Io T suitable for forest scenes and explore the trusted security framework of the Io T in this scene for maintaining the security and ensuring the stable and reliable operation of the forest Io T.Firstly,the main security problems faced by the Io T are summarized and analyzed,and the typical methods of trust evaluation are summarized and sorted out.Aiming at the deployment scenario of the forest Io T,a multi-perspective trust evaluation model is proposed.The model evaluates trust from three perspectives: service,equipment and environment,extracts trust influence factors from each perspective and calculates the trust values,and finally obtains the trust values of comprehensive nodes by dynamically assigning weights.These perspectives profile the working ability of Io T nodes from different angles,and fully consider the characteristics of forest Io T system,which makes the model more suitable for this scene of forest Io T.Experimental comparison shows that this model can get better trust evaluation effect in forest Io T.Secondly,in order to ensure the trustworthiness of the whole Io T community,a three-tier trusted Io T architecture based on trusted terminals,trusted networks and trusted communities is proposed.The security chip is used to verify the trustworthiness of the terminal,and then the security access policy and communication encryption protocol are used to realize the transmission trustworthiness of the Io T network.Then,according to the trust value,the management node is recommended,and the security policy are implemented to achieve the management of trusted groups.The trusted Io T architecture organically combines various security mechanisms,establishes a trusted chain from the equipment hardware,and establishes an overall trusted Io T system,which can ensure the trustworthiness of node groups in the Io T as a whole.Finally,according to the deployment scenario of the real fire-proof Io T,various features are extracted.Experiment in the simulated Io T,dynamically adjust the security policy,and complete the establishment of the trusted Io T.Experiments show that the trusted architecture of the Io T has a good effect in detecting malicious nodes and improving the execution efficiency of the Io T.It has higher security and scalability,and can effectively ensure the safe and reliable operation of the forest Io T system. |