Font Size: a A A

Research On Access Control Technology Of IoT Based On Fog Computing

Posted on:2024-07-14Degree:MasterType:Thesis
Country:ChinaCandidate:W X XuFull Text:PDF
GTID:2568307154498014Subject:Master of Electronic Information (Professional Degree)
Abstract/Summary:PDF Full Text Request
In recent years,with the continuous development of Io T technology,the original access control model can no longer meet the realistic needs,although it can eliminate the security risks of Io T devices in the access process,but there are still some shortcomings: The existing access control models that provide simple access policies are not well suited for large-scale Io T device environments.The access control models that provide complex access policies suffer from the problem of ignoring the low arithmetic power of some Io T devices.In order to solve the above problems,this thesis researches and analyzes the access control among Io T devices based on fog computing combined with blockchain technology.A Fog-based Io T Reputation-based Access Control Model(F-RBAC)is designed in this thesis.The model solves the problem of low arithmetic power of some Io T devices by putting the main work on the blockchain through fog node agents,and completes the control of device access rights through smart contracts to provide an effective and secure method for Io T access control.In the F-RBAC model,a reputation mechanism is designed to achieve dynamic access rights allocation for Io T devices,which dynamically allocates access rights to devices based on the collection of reputation values and related attributes of Io T devices.For access devices with different reputation values,the corresponding access rights are defined,and only when the reputation value of the access device is greater than the access reputation threshold set by the access control policy,the device can be accessed and obtain the corresponding rights.In the F-RBAC model,in order to improve the efficiency of detecting the access behavior of Io T devices,this thesis designs the CS-Apriori algorithm based on the Apriori mining algorithm and the Cuckoo Search(CS)algorithm.It is experimentally proven to provide an effective method for the detection of Io T device access behavior.Finally,the feasibility verification and security test of the above work is carried out with a specific application scenario of smart factory,and the analysis concludes that the F-RBAC model has high security,reliability and practicality when applied to Io T access control.
Keywords/Search Tags:Fog computing, Blockchain, Smart contract, The Apriori algorithm, Cuckoo Sear ch algorithm
PDF Full Text Request
Related items