物联网感知层数据安全融合技术的研究和实现
[Abstract]:The Internet of things (IOT) is an important part of the new generation of communication technology, and its applications include military, commercial, industrial, transportation, medicine and so on. The sensing layer of the Internet of things is usually composed of perceptual nodes, which has the characteristics of self-organization, large-scale, low power consumption and low computing storage capacity. Perception layer nodes are densely distributed, and a large number of wireless signal synchronous transmission can lead to network congestion, resulting in the increase of packet loss rate. At the same time, because of its simple structure, low cost and limited energy, excessive transmission overhead will lead to fast consumption of node resources. Therefore, data fusion is one of the key technologies in the perception layer of the Internet of things. It is very effective for improving the network efficiency and prolonging the network life cycle. However, both the communication channel and the sensing layer nodes are vulnerable to malicious attacks. So data fusion technology can reduce the overhead of network transmission and bring security hidden trouble. Therefore, based on the analysis and comparison of the advantages and disadvantages of many security fusion algorithms, two security fusion algorithms are designed in this paper. Aiming at the problem that the transmission overhead of ID number is too high in the classical algorithm CMT, a data security fusion algorithm EDCSDA. based on packet compression and automatic error correction is designed. In this algorithm, the fusion nodes use permutation and combination to encode the ID number of the sub-nodes involved in the fusion. After coding, the result is transmitted to the base station in multi-hop mode, and the base station decodes according to certain rules. Matlab simulation shows that the transmission overhead of this algorithm is much smaller than that of CMT algorithm. In order to solve the complex problem of key distribution and key management mechanism of existing secure fusion algorithms, an approximate fusion algorithm PADSA. is designed. Based on the analysis of the probability distribution model of the node data acquisition, the effect of hiding the original data can be achieved by superimposing the disturbed data on the basis of the original data collection. At the same time, it is proved by mathematics that the base station has a large number of node data, but the cluster head can not restore the data in the case of a small number of node data. This paper designs and implements the test bed system of the perception layer of the Internet of things, and tests it on the system. The test results prove the feasibility of the two algorithms, and prove that the two algorithms can effectively reduce the transmission overhead while ensuring the security.
【学位授予单位】:东南大学
【学位级别】:硕士
【学位授予年份】:2015
【分类号】:TP391.44;TN929.5;TP202
【相似文献】
相关期刊论文 前10条
1 刘勇;侯荣旭;;浅谈物联网的感知层[J];电脑学习;2010年05期
2 陈红霞;赵俊钰;;物联网感知层标准体系架构研究[J];电信科学;2011年09期
3 顾燕;;物联网感知层技术与微米级压电陶瓷传感器的研究[J];时代教育;2013年22期
4 马文霞;;物联网中感知层的安全问题分析[J];无线互联科技;2012年05期
5 马骏;郭渊博;马建峰;熊金波;张涛;;物联网感知层一种分层访问控制方案[J];计算机研究与发展;2013年06期
6 马骏;郭渊博;马建峰;刘西蒙;李琦;;物联网感知层基于资源分层的多用户访问控制方案[J];电子学报;2014年01期
7 戴超;夏骆辉;张炎;;物联网感知层及其测试技术的研究[J];现代电信科技;2012年09期
8 马纪丰;梁浩;;物联网感知层信息安全分析与建议[J];现代电子技术;2012年19期
9 黄贵玲;;安全监控物联网感知层接入设备的硬件设计[J];信息技术与标准化;2013年09期
10 俞玉莲;;物联网感知层中的关键技术分析[J];科技信息;2013年12期
相关重要报纸文章 前2条
1 张扬 何满怀;陈俊杰:感知层是物联网发展的关键[N];江苏科技报;2010年
2 本报记者 李旭阳;斩“手”[N];计算机世界;2012年
相关博士学位论文 前2条
1 许建龙;物联网平台感知层建模与快速调度方法研究及应用[D];华南理工大学;2013年
2 乔举义;物联网感知层中资源分配与调度算法研究[D];北京邮电大学;2013年
相关硕士学位论文 前5条
1 孙雄;物联网感知层数据安全融合技术的研究和实现[D];东南大学;2015年
2 金鑫;煤矿井下物联网感知层的研究[D];安徽理工大学;2013年
3 黄宇;基于对称多项式方法的物联网感知层安全技术研究[D];辽宁大学;2013年
4 戴雷;基于Blom矩阵方法的物联网感知层安全协议研究[D];复旦大学;2011年
5 汪永鹏;物联网感知层智能网关及开放服务接口的研究与实现[D];北京邮电大学;2013年
,本文编号:2293551
本文链接:https://www.wllwen.com/kejilunwen/wltx/2293551.html