基于Web的社交物联网体系架构、模型及其安全与隐私关键技术研究
[Abstract]:Internet of Things (IoT) connects all kinds of sensors, controllers and embedded devices in the physical world to the Internet through wired and wireless access. It expands the boundary and ability of information system to obtain the information of the physical world. On the basis of the traditional information network with human semantics as the core, the object contribution data is introduced. Compared with the Internet, the Internet of Things has the following characteristics: (1) the Internet of Things has deployed a large number of heterogeneous sensors, each sensor is an information source, different types of sensors obtain different information content and information format; (2) Things. The environmental data collected by Internet terminals are real-time; (3) User experience-centered application innovation is the driving force for the development of the Internet of Things.
The current industry-based Internet of Things (IOT) systems adopt a tightly coupled closed architecture, which makes the systems present a silo-like information island. Although this architecture is suitable for large-scale industrial applications with a clear demand, it is difficult to open and share data and service capabilities because of the system infrastructure, and third-party resources. It is difficult to be integrated into the system at low cost, which makes it difficult to apply and popularize the Internet of Things on a large scale. In addition, the problems of fragmentation of market, small scale of application, high threshold of development, long development cycle and low participation of users in the field of Internet of Things constitute the bottleneck of the development of the Internet of Things. It is the inevitable direction of the development of the Internet of Things technology to realize the convenient sharing of information data and control functions of the Internet of Things terminals, to integrate the end nodes of the perceptual network into the information space, and to realize the ubiquitous computing business environment with the open and universal service capability.
In view of the above problems, this paper summarizes the future development of the Internet of Things as two major trends of openness and socialization, and proposes a Web-based Social Web of Things (SWoT) architecture. Heterogeneous devices, capabilities abstracted into a unified resource model, using URI (Uniform Resource Identifier) to unify fine-grained resource identification, to shield the underlying heterogeneity, to achieve unified collaborative processing and scheduling of resources; based on SWOT service platform and service gateway, a REST API is designed to build a more open network and information collaboration. From a social point of view, the core idea of SWoT is: on the one hand, it supports the socialized intelligent interaction between people and things, and between things, so that users can share personal devices and perceived data; on the other hand, it will Entities and their physical and logical relationships in the Internet of Things are abstracted as points and edges in social networks. Complex social models can connect "point-like" resources into a network through multi-dimensional social relations, creating more space for resource sharing, trust evaluation, access control and other services. Home system realizes the unified identification of resources, openness, and intelligent interaction of nodes. At the same time, based on Sina Weibo social platform, the application of Internet of Things resource discovery is developed, and the performance analysis is carried out.
However, the data collected by the Internet of Things (IOT) through cameras, sensors and so on are closely related to people's daily life, and their perceptions are highly related. This huge system will become a huge peer-to-peer system if it is not added to the security and privacy standards. Especially in the SWoT IOT business environment, communication, data collaboration and other operations. More frequently, third-party applications will acquire data through open interfaces for data mining, and will be more aware of our behavior and preferences than we do, which will pose a threat to sensitive data and privacy information; as perceived data may be stored on heterogeneous distributed business gateways and stored, managed, and opened, it will also create storage Storage and search security issues. As the Internet of Things becomes more socialized, users will share more personal devices and perceived data. Various SWOT node attributes, complex social relationships, and user-generated content (UGC) in social processes will be able to uniquely locate a single node, thus providing security for traditional data sets. Privacy technology is difficult to directly apply, and it is more difficult to predict the privacy leakage of users, and it is also more difficult to protect privacy.
Aiming at the security and privacy problems brought about by the socialization of the Internet of Things, this paper proposes a privacy measurement algorithm for anonymous publishing of data based on attacker's background knowledge. Firstly, we analyze the possible attacker's background knowledge in SWoT, and design a hidden algorithm based on multivariate kernel regression model for the correlation of node attributes and the background knowledge of connection relationship. Private measurement algorithm, this algorithm fully considers the data distribution of each attribute and proposes the concept of local kernel bandwidth, and introduces covariance matrix to improve the original hypothesis attribute independent kernel regression algorithm. Considering the high dimensionality of content vectors generated by UGC through TF-IDF, we use PCA dimensionality reduction technology to further improve the algorithm. By simulating the real data of Sina Weibo with MATLAB, we verify that the algorithm can effectively measure the above three. Privacy breaches brought about by background knowledge of attackers.
In order to solve the security and privacy problems of storage and search caused by the open mode of service gateway in SWoT, a security enhanced search algorithm based on node trust and P2P Chord virtual security domain is proposed. A trust evaluation algorithm based on the integration of Underlay and Overlay is designed. The virtual security domain based on Chord is constructed, and the inter-domain routing table, intra-domain routing table and evaluation list are defined. The maintenance of virtual security domain is discussed to solve the problem of resource storage and security search in the open mode of SWoT service gateway. The security enhancement search algorithm based on P2P virtual security domain is discussed. A two-tier access control mechanism for security domain and node is designed, and an optimal node selection strategy is proposed.
【学位授予单位】:北京邮电大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TP391.44;TN929.5
【相似文献】
相关期刊论文 前10条
1 李建元;张楠楠;;物联网仍需十年磨一剑[J];通信企业管理;2010年08期
2 梁振鹏;;物联网美梦暂难圆[J];中国经济和信息化;2010年13期
3 陈永东;;物联网的切入点在哪里?[J];软件工程师;2010年07期
4 张鹏;;警惕物联网“核心”漏洞[J];通信世界;2010年19期
5 李向文;;欧、美、日韩及我国的物联网发展战略——物联网的全球发展行动[J];射频世界;2010年03期
6 ;黑龙江着力发展农业物联网应用[J];信息技术;2010年06期
7 石立峰;;物联网发展如火如荼 安全隐私问题难以避免[J];世界电信;2010年10期
8 许正军;;探秘物联网的“内核”[J];上海信息化;2010年11期
9 叶惠;;物联网:拓展蓝海的重要举措[J];通讯世界;2010年10期
10 ;“感知中国”物联网联盟在无锡成立[J];信息技术与标准化;2010年09期
相关会议论文 前10条
1 李玮;;致力于物联网应用[A];新观点新学说学术沙龙文集47:物联网产业与区域经济发展[C];2010年
2 ;物联网前端识别技术之比较[A];四川省通信学会2009年学术年会论文集[C];2009年
3 ;解读物联网发展历程[A];四川省通信学会2009年学术年会论文集[C];2009年
4 刘东凯;;“3G物联网”能否改变世界 用户在哪里?[A];四川省通信学会2009年学术年会论文集[C];2009年
5 徐东英;;物联网离我们有多远?[A];四川省通信学会2009年学术年会论文集[C];2009年
6 李研;吴淼;吕廷杰;赵蔚;;国外物联网发展情况及对中国物联网发展的启示[A];两化融合与物联网发展学术研讨会论文集[C];2010年
7 刘学敏;;京津冀战略性新兴产业——物联网的发展问题研究[A];2010年度京津冀区域协作论坛论文集[C];2010年
8 宋蕊;曾剑秋;;物联网应用的发展状况及建设“感知中国”的策略探讨[A];两化融合与物联网发展学术研讨会论文集[C];2010年
9 胡晓川;陈金鹰;杨超;;物联网——新新“物”语[A];四川省通信学会2010年学术年会论文集[C];2010年
10 肖克辉;肖德琴;周权;;农业物联网实验室建设[A];Proceedings of 2011 National Teaching Seminar on Cryptography and Information Security(NTS-CIS 2011) Vol.1[C];2011年
相关重要报纸文章 前10条
1 本报记者 张华甲;物联网是两化融合重要组成[N];中国工业报;2010年
2 (谢涛);物联网:两化融合的着力点[N];电脑商报;2010年
3 省工业和信息化委员会信息化推进与管理处 张安;我省应发挥优势抓住物联网发展机遇[N];黑龙江日报;2010年
4 本报记者 李响 吴玉征;物联网产业突破新引擎[N];计算机世界;2010年
5 本报记者 许泳;物联网不是“物秀秀”[N];计算机世界;2010年
6 南开大学教授 杨永志;充分认识物联网对经济社会发展的影响[N];人民日报;2010年
7 本报记者 潘少军;物联网 让城市变聪明[N];人民日报;2010年
8 记者 李雁争 编辑 阮奇;工信部将出台政策为物联网发展“撑腰”[N];上海证券报;2010年
9 本报记者 罗学锋 雷黎丽;抢抓物联网发展机遇 打造物联网示范城市[N];乐山日报;2010年
10 特约撰稿 周洪波 北京同方软件股份有限公司常务副总经理兼CTO;千面物联网[N];计算机世界;2010年
相关博士学位论文 前10条
1 董新平;物联网产业成长研究[D];华中师范大学;2012年
2 郑欣;物联网商业模式发展研究[D];北京邮电大学;2011年
3 周明;物联网应用若干关键问题的研究[D];北京邮电大学;2014年
4 蒲海涛;物联网环境下基于上下文感知的智能交互关键技术研究[D];山东科技大学;2011年
5 孙运雷;物联网服务质量动态保障方法研究[D];北京邮电大学;2014年
6 吴亮;物联网技术服务采纳与个人隐私信息影响研究[D];电子科技大学;2011年
7 王军平;基于物联网的服务提交关键技术与系统的研究[D];北京邮电大学;2013年
8 俞磊;基于物联网技术的智慧医院架构及服务访问研究[D];合肥工业大学;2014年
9 杨金翠;物联网环境下的控制安全关键技术研究[D];北京邮电大学;2013年
10 熊大红;基于本体的农业物联网信息智能管理机制研究[D];湖南农业大学;2013年
相关硕士学位论文 前10条
1 戴蕾;我国物联网产业链构建研究[D];北京邮电大学;2011年
2 陈帅;广西物联网产业发展研究[D];广西师范学院;2011年
3 吴凌峰;物联网的发展对湖南区域文化传播的机遇、挑战及对策研究[D];中南大学;2011年
4 谢范雄;基于生态链的农业物联网应用商业模式研究[D];复旦大学;2011年
5 李磊;口岸物联网应用解决方案研究[D];大连海事大学;2010年
6 周世杰;物联网的应用及产业链分析[D];北京邮电大学;2011年
7 李志远;物联网技术在船用物资贮运系统的应用研究[D];西安工业大学;2012年
8 袁东亮;物联网的研究与应用[D];中国地质大学(北京);2012年
9 张伟;武汉市物联网技术路线图研究[D];湖北工业大学;2012年
10 宋鑫;物联网技术下的人本主义诉求[D];南昌大学;2012年
,本文编号:2206154
本文链接:https://www.wllwen.com/kejilunwen/wltx/2206154.html