物聯(lián)網(wǎng)感知數(shù)據(jù)傳輸?shù)陌踩喾接嬎汴P(guān)鍵技術(shù)研究
本文關(guān)鍵詞: 物聯(lián)網(wǎng) 感知數(shù)據(jù) 安全多方計算 K-means聚類 RFID 無線傳感網(wǎng)絡(luò) 出處:《中國地質(zhì)大學》2017年博士論文 論文類型:學位論文
【摘要】:隨著“智慧地球、物物相連”的提出,人類由互聯(lián)網(wǎng)時代逐步邁向物聯(lián)網(wǎng)時代。物聯(lián)網(wǎng)是繼計算機、互聯(lián)網(wǎng)和移動通信之后的又一次信息產(chǎn)業(yè)的革命性發(fā)展。物聯(lián)網(wǎng)是在互聯(lián)網(wǎng)的基礎(chǔ)上,利用射頻識別RFID、傳感器和無線傳感網(wǎng)絡(luò)WSNs等技術(shù),構(gòu)建一個覆蓋世界上所有人與物的網(wǎng)絡(luò)信息系統(tǒng),從而使人類的經(jīng)濟社會與社會生活、生產(chǎn)運行與個人活動都運行在智慧的物聯(lián)網(wǎng)基礎(chǔ)設(shè)施之上。物聯(lián)網(wǎng)是全面感知的網(wǎng)絡(luò),它是各種感知技術(shù)的廣泛應(yīng)用。物聯(lián)網(wǎng)上部署了數(shù)量巨大、類型繁多的傳感器,每個傳感器都是一個信息源,不同類別的傳感器所捕獲的信息內(nèi)容和信息格式不同。傳感器獲得的數(shù)據(jù)具有實時性,按一定的頻率周期性的采集環(huán)境信息,不斷更新數(shù)據(jù)。物聯(lián)網(wǎng)在終端采集的數(shù)據(jù)稱作感知數(shù)據(jù),因此海量的感知數(shù)據(jù)安全傳輸是個亟待解決的問題。本論文就如何安全傳輸物聯(lián)網(wǎng)中的感知數(shù)據(jù)展開了研究。物聯(lián)網(wǎng)中感知數(shù)據(jù)的安全傳輸?shù)囊蟾?它不僅要保證數(shù)據(jù)不被攻擊與篡改,同時又不能泄露用戶的隱私。本文對錯綜復雜的感知數(shù)據(jù)進行了分析,首先在物聯(lián)網(wǎng)中的感知層和接入層建立一個信任機制,構(gòu)建感知數(shù)據(jù)處理模型,提出了一個層次化的信任機制,分離了異構(gòu)環(huán)境中主體的不同信任需求;在信任架構(gòu)中構(gòu)建了“現(xiàn)象可信-行為可信-節(jié)點可信-機構(gòu)可信-授權(quán)可信”的環(huán)流,將感知節(jié)點信任和機構(gòu)信譽進行很好的整合;本文建立感知數(shù)據(jù)處理模型,對此模型進行數(shù)學建模,將該問題形式化,讓該數(shù)學模型能適應(yīng)于物聯(lián)網(wǎng)的安全需求。由此本文引入了安全多方計算(Secure Multiparty Computation,SMC),即:有多個參與方參與計算的情況下,多個參與者共同計算某個函數(shù)。該函數(shù)的輸入信息分別由這些參與者提供,輸入信息各自保密,不被其他人知道;感知數(shù)據(jù)是分布式的,并不集中在某個節(jié)點,對這些感知數(shù)據(jù)采取分布式數(shù)據(jù)隱私保護,本文采取的是K-means聚類算法,物聯(lián)網(wǎng)中的計算是架構(gòu)在云計算上的,因此本文將感知數(shù)據(jù)的計算外包給云端,繼續(xù)研究了K-means聚類算法的外包計算,設(shè)計出了多方聚類隱私保護的K-means聚類算法外包計算,使得當有n方參與計算,協(xié)議過程中的計算完全對等,并且各方之間在交互通信過程中都有自己的隨機數(shù)對信息進行加密保護,但是從交互的結(jié)果不能推導出其他方的隱私信息,實現(xiàn)了物聯(lián)網(wǎng)感知數(shù)據(jù)的安全傳輸。物聯(lián)網(wǎng)的網(wǎng)絡(luò)已是無線傳感器網(wǎng)絡(luò)WSNs為主導,本文研究了無線傳感網(wǎng)絡(luò)感知數(shù)據(jù)傳輸?shù)膿砣麊栴},WSNs節(jié)點需要將感知數(shù)據(jù)或經(jīng)預(yù)處理后的感知數(shù)據(jù)傳輸?shù)絊ink節(jié)點。當傳感器節(jié)點接收到的數(shù)據(jù)包(或分組)超過其轉(zhuǎn)發(fā)或處理數(shù)據(jù)包的上限時,需要對過剩數(shù)據(jù)包進行緩存;當緩存數(shù)據(jù)包的內(nèi)存已滿時,過剩的數(shù)據(jù)包就會被丟棄,即引發(fā)緩沖區(qū)溢出,造成節(jié)點級的擁塞。本論文提出了基于反饋控制的能耗平衡策略(PLFC),利用反饋控制算法調(diào)整節(jié)點的發(fā)射功率實現(xiàn)了網(wǎng)絡(luò)中節(jié)點負載的重新分配,解決無線傳感器網(wǎng)絡(luò)中節(jié)點的能耗不平衡問題,進一步延長了傳感網(wǎng)絡(luò)的生命周期。感知數(shù)據(jù)來自于感知層的感知設(shè)備的采集,而目前比較流行的就是在感知層設(shè)備的終端采取RFID技術(shù)。RFID系統(tǒng)主要由電子標簽,讀寫器和后臺服務(wù)器3個部分組成。為保護RFID系統(tǒng)的隱私安全,首先必須在通信前對通信雙方的身份進行認證,防止偽造的電子標簽或者非法的讀寫器,其次,通信雙方之間的信息傳送不能以明文方式進行,必須采取一定的加密措施,防止隱私信息泄露,F(xiàn)有的大量RFID認證協(xié)議都是作用于讀寫器和后臺服務(wù)器之間,并且假設(shè)信道是安全的,但在實際上這些信道并不一定安全,因此本論文針對RFID技術(shù)進行了詳細研究,提出了基于RFID技術(shù)的感知數(shù)據(jù)的多向認證與密鑰協(xié)商協(xié)議,該協(xié)議進行了多向認證,在標簽、對閱讀器、服務(wù)器三者之間進行認證,三者互相認證都無誤才能證明感知數(shù)據(jù)傳輸?shù)男诺朗前踩摹T搮f(xié)議簡化了通信雙方公開值的傳遞,將其交由認證服務(wù)器來傳達,而且這對安全性沒有影響,因為即便服務(wù)器被攻破,敵手也無法通過后面的認證。本文提出的協(xié)議能夠有效解決RFID系統(tǒng)的隱私保護問題。最后,本文進行了總結(jié),并指出論文在研究工作中還需要進一步完善和有待改進的地方,并對下一步工作和目標進行了展望。
[Abstract]:With the wisdom of the earth, the connection of objects ", human beings by the Internet era gradually towards the era of things. Things is the second computer, another revolutionary development of information industry after the Internet and mobile communication. The Internet is based on the Internet, the use of radio frequency identification RFID sensor and wireless sensor network WSNs technology, build a network information system covering all people and the world, so that the economic and social life of human society, production operation and personal activities are run online in the wisdom of the object based on the infrastructure. Networking is fully aware of the network, it is widely used in a variety of sensing technology the Internet of things. The deployment of large quantities of various types of sensors, each sensor is a source of information, information content and format information of different types of sensors capture the different sensor number obtained. According to the real-time information collection environment, according to a certain frequency of the periodic, continuously updated data. Things called the perception data in the data acquisition terminal, so the perception of safe data transmission is a massive problem to be solved. This thesis is to secure data transmission sensing in IOT are studied. The safe transmission of perception the data in the Internet of things is more demanding, it should not only ensure the data will not be attacked and tampered with, and can not disclose the privacy of users. Based on the analysis of the sensing data perplexing in the Internet of things, first in the sensing layer and access layer to establish a trust mechanism, construct the perception model of data processing is proposed. The trust mechanism is a hierarchical, separation of different trust demand subjects in a heterogeneous environment; in the framework of constructing "trust phenomenon - trusted node behavior trusted trusted - trusted institutions - Grant Circulation right credible, perceived trust and reputation mechanism has good integration; the perception data processing model, this model for mathematical modeling, the problem is formalized, so the mathematical model can meet the security requirements in the Internet of things. This paper introduces the secure multi-party computation (Secure Multiparty Computation, SMC), that there are multiple parties involved in the calculation, a number of participants to calculate a function. The function of the input information provided by the participants, their input information confidential, not other people know that; the sensing data is distributed and is not in a centralized node, using distributed data privacy protection the perception of these data, this paper adopts the K-means clustering algorithm, the calculation of the Internet of things is in the framework of cloud computing, this paper will calculate outsourcing sensing data to the cloud, to continue the research The K-means clustering algorithm to calculate the design calculation of outsourcing, outsourcing K-means multi clustering algorithm for Privacy Preserving Clustering, so that when the N party agreement in the process of calculation, calculation and correspondence between the parties in the communication process have their own random numbers for encryption of information protection, but not from the interaction the results derived from the other party's privacy information, realizes the secure transmission of data. The perception of things IOT network is WSNs wireless sensor network oriented, this paper studies the problem of congestion aware wireless sensor network data transmission, the WSNs node will need the sensing data or by sensing data after pretreatment of the transmission to the Sink node. When receiving sensor node packet (or packets) exceed the upper limit of packet forwarding or processing, the need for excess packet buffer; when the cache data packets within Memory is full, the excess packets will be discarded, which caused buffer overflow, causing congestion node level. This thesis puts forward the energy balance strategy based on feedback control (PLFC), realized by redistributing the load of nodes in the network transmit power feedback control algorithm to adjust the node, solve the energy consumption of nodes in wireless sensor in the network imbalance, further prolong the network life cycle. The sensing data from the perception layer of the perception of equipment acquisition, and the current popular terminal equipment is in the sensing layer adopt RFID technology.RFID system is mainly composed of 3 parts, electronic tag, reader and back-end server for the protection. RFID system security and privacy, must first authenticate the identity of the two sides in the communication communication, to prevent counterfeit or illegal electronic tag reader, secondly, between the two party communication channel Information transfer not to clear the way, we must take some measures to prevent the disclosure of confidential information encryption, a large number of RFID. The existing authentication protocol is in between the reader and the back-end server, and assuming that the channel is safe, but in fact, these channels are not necessarily safe, this paper carried out a detailed study of RFID technology and put forward multiple authentication and key agreement protocol sensing data based on RFID technology, the protocol of multi authentication, in the tag, the reader authentication server, between the three and three cross channel certification are correct in order to prove that the data transmission is perceived security. The protocol simplifies the transfer of both sides of communication open the value of the exchange by the authentication server to communicate, but it has no effect on the safety, because even if the server is compromised, the adversary could pass behind this certification. The protocol can effectively solve the privacy protection problem of RFID system. Finally, this paper summarizes, and points out that the paper needs further improvement and improvement in the research work, and prospects for the next work and goal.
【學位授予單位】:中國地質(zhì)大學
【學位級別】:博士
【學位授予年份】:2017
【分類號】:TN929.5;TP391.44;TP212
【相似文獻】
相關(guān)期刊論文 前10條
1 張建靜;房俊;侯榮軍;;基于時間的感知數(shù)據(jù)優(yōu)化統(tǒng)計方法[J];計算機工程與設(shè)計;2014年08期
2 莫路鋒;毛方杰;聶江武;宣子蔚;;基于感知數(shù)據(jù)的無線傳感網(wǎng)被動診斷方法[J];北京郵電大學學報;2013年01期
3 郭龍江;付惠娟;張中兆;;傳感器網(wǎng)絡(luò)感知數(shù)據(jù)自適應(yīng)去噪方法[J];計算機工程與應(yīng)用;2009年13期
4 趙卓峰;魏文飛;馬強;;基于無共享架構(gòu)的海量感知數(shù)據(jù)實時處理系統(tǒng)[J];微電子學與計算機;2012年09期
5 王爽;王國仁;;面向不確定感知數(shù)據(jù)的頻繁項查詢算法[J];計算機學報;2013年03期
6 王思野;許文俊;賀志強;牛凱;吳偉陵;;認知無線網(wǎng)絡(luò)中協(xié)作感知數(shù)據(jù)上報性能分析[J];北京郵電大學學報;2011年S1期
7 馬茜;谷峪;張?zhí)斐?于戈;;一種基于數(shù)據(jù)質(zhì)量的異構(gòu)多源多模態(tài)感知數(shù)據(jù)獲取方法[J];計算機學報;2013年10期
8 李強;顏浩;陳克非;;安全多方計算協(xié)議的研究與應(yīng)用[J];計算機科學;2003年08期
9 李禾;王述洋;;安全多方計算的應(yīng)用研究[J];中國安全科學學報;2008年03期
10 楊陽;;簡易的安全多方計算協(xié)議[J];硅谷;2011年10期
相關(guān)會議論文 前1條
1 邱寧;龐雷;羅群;;基于安全多方計算的拍賣系統(tǒng)設(shè)計與實現(xiàn)[A];第九屆中國通信學會學術(shù)年會論文集[C];2012年
相關(guān)博士學位論文 前8條
1 李海霞;物聯(lián)網(wǎng)感知數(shù)據(jù)傳輸?shù)陌踩喾接嬎汴P(guān)鍵技術(shù)研究[D];中國地質(zhì)大學;2017年
2 孫茂華;安全多方計算及其應(yīng)用研究[D];北京郵電大學;2013年
3 孫溢;安全多方計算中若干應(yīng)用協(xié)議的研究[D];北京郵電大學;2015年
4 劉文;幾類特殊的安全多方計算問題的研究[D];北京郵電大學;2009年
5 李禾;安全多方計算及其在機械工程領(lǐng)域的應(yīng)用研究[D];東北林業(yè)大學;2010年
6 寧超;安全多方計算底層基本運算研究[D];山東大學;2011年
7 耿濤;安全多方計算若干問題以及應(yīng)用研究[D];北京郵電大學;2012年
8 趙洋;安全多方計算及其應(yīng)用協(xié)議研究[D];電子科技大學;2009年
相關(guān)碩士學位論文 前10條
1 熊英;面向移動群體感知的數(shù)據(jù)處理機制研究與系統(tǒng)實現(xiàn)[D];國防科學技術(shù)大學;2013年
2 劉璐;多源多模態(tài)感知數(shù)據(jù)的變頻采樣及融合技術(shù)研究[D];東北大學;2014年
3 丁成龍;農(nóng)田傳感器校正與感知數(shù)據(jù)清理方法研究[D];南京農(nóng)業(yè)大學;2015年
4 張建靜;基于多級緩存的海量感知數(shù)據(jù)檢索優(yōu)化的研究[D];北方工業(yè)大學;2014年
5 馬茜;高可用感知數(shù)據(jù)獲取關(guān)鍵技術(shù)的研究[D];東北大學;2013年
6 孟鵬;基于感知數(shù)據(jù)的三維可視化平臺的設(shè)計與實現(xiàn)[D];天津大學;2013年
7 陳棟;多源異構(gòu)農(nóng)業(yè)感知數(shù)據(jù)接入系統(tǒng)的設(shè)計與實現(xiàn)[D];山東農(nóng)業(yè)大學;2014年
8 林楠;基于TinyOS的無線傳感網(wǎng)絡(luò)感知數(shù)據(jù)分析與展示系統(tǒng)[D];華南理工大學;2013年
9 張鑫龍;基于協(xié)同過濾的傳感器感知數(shù)據(jù)補全技術(shù)研究[D];東北大學;2013年
10 陳光;移動用戶感知數(shù)據(jù)監(jiān)控分析系統(tǒng)的設(shè)計與實現(xiàn)[D];北京郵電大學;2008年
,本文編號:1451804
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/1451804.html