物联网环境下基于纠删码技术的数据完整性保护方法研究

发布时间:2018-09-05 19:47
【摘要】:近年来,物联网技术作为最新一代的IT技术在飞速的发展。顾名思义,物联网即物物相连的网络,通过技术手段来实现物与物之间、人与人之间、人与物之间的协同通信关系,应用互联网、无线传感网络、移动通讯网络等技术手段形成整个复杂的系统,它的各项技术广泛地应用在智能家居、环境检测保护、智能化交通、大信息采集、以及军事等各个领域,经过这几年的发展,物联网技术日趋成熟可靠,它已经成为社会正常运行工作的一项必不可少的技术。物联网技术正处于快速发展的阶段,但很多技术是不健全的,相比于传统计算机技术会有较大的漏洞,因此在发展物联网技术的同时,保护物联网安全也是每个研究者不可避免遇到的问题。由于无线传感网络广泛应用到了物联网节点的感知层,而无线传感网络在传输数据时具有很大的波动性,它的传输效果会受到实际环境的干扰,导致网络不稳定产生数据丢包,因此在无线传感网络中的物联网节点,面临的最大挑战就是数据完整性保护。找到一种适合物联网环境节点处理能力有限、内存空间有限、能耗容忍度低、系统复杂多变等特点的保护策略,是研究物联网安全必须要面对的问题。本文针对物联网安全受到的这项挑战,深入分析了物联网安全的研究现况以及相应的数据完整性保护策略,从众多的数据容错方法中,选择了纠删码技术作为解决物联网环境下数据完整性保护的策略,纠删码技术已经在很多领域广泛应用,技术较为成熟可靠,纠删码技术归属于向前纠错码的一种,它可以将整条数据分片编码,并且可以通过解码操作,在一定容忍程度内,回复所丢失的数据,给数据的完整性、可靠性提供了强大保障,它能够提供完整性检测和纠错的功能。本文采用纠删码中最典型的Reed-Solomon码作为搭载物联网节点中的数据完整性保护算法,并且通过C程序进行实现,物联网节点选择最新型的微型计算机Raspberry Pi,中文译名“树莓派”,它是一台搭载着微型处理器的基于ARM的微型电脑主板,用它来模拟物联网环境下的一台视频监控装置。当网络环境较差时,容易发生数据包丢失时,可以启用纠删码保护的策略,树莓派节点在向主机发送数据前,先进行纠删码编码操作,发送到主机后,在进行纠删码解码操作,即可通过冗余块恢复丢失的数据块,从而还原原照片数据。经过实验严谨测试,在模拟网络环境较差的实验中,纠删码技术可以通过编码解码操作来修复丢失数据,并且实验的各项性能指标均符合物联网环境下的特点。因此本文提出的方法,为物联网环境下的数据完整性保护提出了新的角度,具有很强的可行性和时效性,能够应用到社会实际工作中来。
[Abstract]:In recent years, the Internet of things as the latest generation of IT technology in the rapid development. As the name implies, the Internet of things is the network where things are connected. By means of technology, the cooperative communication relationship between objects, people, people and objects is realized, and the Internet is used, and wireless sensor networks are used. The mobile communication network and other technical means form the whole complex system. Its various technologies are widely used in the fields of intelligent home, environmental detection and protection, intelligent traffic, large information collection, military and so on. After several years of development, Internet of things technology is becoming more and more mature and reliable, it has become an essential technology in the normal operation of society. The Internet of things technology is in the stage of rapid development, but many technologies are not perfect, compared with the traditional computer technology, there will be a larger loophole, so while developing the Internet of things technology at the same time, Protecting the Internet of things is an inevitable problem for every researcher. Wireless sensor network (WSN) is widely used in the sensing layer of Internet of things (IoT) nodes, but the wireless sensor network (WSN) has great volatility in transmitting data, its transmission effect will be interfered by the actual environment, resulting in the instability of the network resulting in data packet loss. Therefore, in wireless sensor networks, the biggest challenge to the Internet of things nodes is data integrity protection. It is necessary to study the security of the Internet of things by finding a protection strategy suitable for the limited processing capacity of nodes in the Internet of things limited memory space low tolerance of energy consumption and complexity of the system. In view of this challenge to Internet of things security, this paper deeply analyzes the research status of Internet of things security and the corresponding data integrity protection strategy, from many data fault-tolerant methods, Erasure code technology is chosen as a strategy to protect data integrity in Internet of things environment. Erasure code technology has been widely used in many fields, the technology is more mature and reliable, erasure code technology belongs to forward error correction code. It can encode the whole piece of data, and can recover the lost data in a certain degree of tolerance by decoding operation, which provides a strong guarantee for the integrity and reliability of the data. It can provide integrity detection and error correction functions. In this paper, the most typical Reed-Solomon code in erasure code is used as the data integrity protection algorithm in the Internet of things node, and it is realized by C program. The Internet of things node chooses the newest microcomputer Raspberry Pi, to translate the name "raspberry pie" into Chinese. It is a microprocessor-based ARM motherboard that simulates a video surveillance device in the Internet of things environment. When the network environment is poor, packet loss is easy to occur, the erasure code protection strategy can be enabled. The raspberry node encodes erasure code before sending data to the host, and after sending to the host, it decodes the erasure code. The lost data block can be restored by redundant block, so as to restore the original photo data. After rigorous test, erasure code technology can repair the lost data by encoding and decoding operation in the experiment of poor simulation network environment, and all the performance indexes of the experiment are in line with the characteristics of the Internet of things environment. Therefore, the method proposed in this paper provides a new angle for the protection of data integrity in the Internet of things environment, and has strong feasibility and timeliness, and can be applied to the practical work of society.
【学位授予单位】:吉林大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP391.44;TN929.5

【相似文献】

相关期刊论文 前10条

1 吴雪霁;;把握“物联网”时代的三个关键点[J];通信世界;2009年33期

2 秦茜;;物联网骤成产业巨浪 各方大肆追捧恐为时尚早[J];IT时代周刊;2009年Z2期

3 石菲;;物联网还有多远[J];中国计算机用户;2009年Z2期

4 马继华;韩文哲;;物联网的未来会变成“空中楼阁”吗?[J];信息网络;2009年10期

5 ;物联网系列报道之一 理性物联网[J];通信世界;2009年40期

6 李鹏;;物联网发展 标准与应用先行[J];通信世界;2009年40期

7 李鹏;赵经纬;;北邮谢东亮 物联网需两颗红心一种准备[J];通信世界;2009年40期

8 周双阳;;寻找物联网的制高点[J];通信世界;2009年41期

9 张鹏;;物联网,十年涅i,

本文编号:2225284


资料下载
论文发表

本文链接:https://www.wllwen.com/shoufeilunwen/xixikjs/2225284.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户36441***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com