中国韩国日本在线观看免费,A级尤物一区,日韩精品一二三区无码,欧美日韩少妇色

當(dāng)前位置:主頁 > 碩博論文 > 信息類碩士論文 >

物聯(lián)網(wǎng)環(huán)境下基于糾刪碼技術(shù)的數(shù)據(jù)完整性保護方法研究

發(fā)布時間:2018-09-05 19:47
【摘要】:近年來,物聯(lián)網(wǎng)技術(shù)作為最新一代的IT技術(shù)在飛速的發(fā)展。顧名思義,物聯(lián)網(wǎng)即物物相連的網(wǎng)絡(luò),通過技術(shù)手段來實現(xiàn)物與物之間、人與人之間、人與物之間的協(xié)同通信關(guān)系,應(yīng)用互聯(lián)網(wǎng)、無線傳感網(wǎng)絡(luò)、移動通訊網(wǎng)絡(luò)等技術(shù)手段形成整個復(fù)雜的系統(tǒng),它的各項技術(shù)廣泛地應(yīng)用在智能家居、環(huán)境檢測保護、智能化交通、大信息采集、以及軍事等各個領(lǐng)域,經(jīng)過這幾年的發(fā)展,物聯(lián)網(wǎng)技術(shù)日趨成熟可靠,它已經(jīng)成為社會正常運行工作的一項必不可少的技術(shù)。物聯(lián)網(wǎng)技術(shù)正處于快速發(fā)展的階段,但很多技術(shù)是不健全的,相比于傳統(tǒng)計算機技術(shù)會有較大的漏洞,因此在發(fā)展物聯(lián)網(wǎng)技術(shù)的同時,保護物聯(lián)網(wǎng)安全也是每個研究者不可避免遇到的問題。由于無線傳感網(wǎng)絡(luò)廣泛應(yīng)用到了物聯(lián)網(wǎng)節(jié)點的感知層,而無線傳感網(wǎng)絡(luò)在傳輸數(shù)據(jù)時具有很大的波動性,它的傳輸效果會受到實際環(huán)境的干擾,導(dǎo)致網(wǎng)絡(luò)不穩(wěn)定產(chǎn)生數(shù)據(jù)丟包,因此在無線傳感網(wǎng)絡(luò)中的物聯(lián)網(wǎng)節(jié)點,面臨的最大挑戰(zhàn)就是數(shù)據(jù)完整性保護。找到一種適合物聯(lián)網(wǎng)環(huán)境節(jié)點處理能力有限、內(nèi)存空間有限、能耗容忍度低、系統(tǒng)復(fù)雜多變等特點的保護策略,是研究物聯(lián)網(wǎng)安全必須要面對的問題。本文針對物聯(lián)網(wǎng)安全受到的這項挑戰(zhàn),深入分析了物聯(lián)網(wǎng)安全的研究現(xiàn)況以及相應(yīng)的數(shù)據(jù)完整性保護策略,從眾多的數(shù)據(jù)容錯方法中,選擇了糾刪碼技術(shù)作為解決物聯(lián)網(wǎng)環(huán)境下數(shù)據(jù)完整性保護的策略,糾刪碼技術(shù)已經(jīng)在很多領(lǐng)域廣泛應(yīng)用,技術(shù)較為成熟可靠,糾刪碼技術(shù)歸屬于向前糾錯碼的一種,它可以將整條數(shù)據(jù)分片編碼,并且可以通過解碼操作,在一定容忍程度內(nèi),回復(fù)所丟失的數(shù)據(jù),給數(shù)據(jù)的完整性、可靠性提供了強大保障,它能夠提供完整性檢測和糾錯的功能。本文采用糾刪碼中最典型的Reed-Solomon碼作為搭載物聯(lián)網(wǎng)節(jié)點中的數(shù)據(jù)完整性保護算法,并且通過C程序進行實現(xiàn),物聯(lián)網(wǎng)節(jié)點選擇最新型的微型計算機Raspberry Pi,中文譯名“樹莓派”,它是一臺搭載著微型處理器的基于ARM的微型電腦主板,用它來模擬物聯(lián)網(wǎng)環(huán)境下的一臺視頻監(jiān)控裝置。當(dāng)網(wǎng)絡(luò)環(huán)境較差時,容易發(fā)生數(shù)據(jù)包丟失時,可以啟用糾刪碼保護的策略,樹莓派節(jié)點在向主機發(fā)送數(shù)據(jù)前,先進行糾刪碼編碼操作,發(fā)送到主機后,在進行糾刪碼解碼操作,即可通過冗余塊恢復(fù)丟失的數(shù)據(jù)塊,從而還原原照片數(shù)據(jù)。經(jīng)過實驗嚴謹測試,在模擬網(wǎng)絡(luò)環(huán)境較差的實驗中,糾刪碼技術(shù)可以通過編碼解碼操作來修復(fù)丟失數(shù)據(jù),并且實驗的各項性能指標均符合物聯(lián)網(wǎng)環(huán)境下的特點。因此本文提出的方法,為物聯(lián)網(wǎng)環(huán)境下的數(shù)據(jù)完整性保護提出了新的角度,具有很強的可行性和時效性,能夠應(yīng)用到社會實際工作中來。
[Abstract]:In recent years, the Internet of things as the latest generation of IT technology in the rapid development. As the name implies, the Internet of things is the network where things are connected. By means of technology, the cooperative communication relationship between objects, people, people and objects is realized, and the Internet is used, and wireless sensor networks are used. The mobile communication network and other technical means form the whole complex system. Its various technologies are widely used in the fields of intelligent home, environmental detection and protection, intelligent traffic, large information collection, military and so on. After several years of development, Internet of things technology is becoming more and more mature and reliable, it has become an essential technology in the normal operation of society. The Internet of things technology is in the stage of rapid development, but many technologies are not perfect, compared with the traditional computer technology, there will be a larger loophole, so while developing the Internet of things technology at the same time, Protecting the Internet of things is an inevitable problem for every researcher. Wireless sensor network (WSN) is widely used in the sensing layer of Internet of things (IoT) nodes, but the wireless sensor network (WSN) has great volatility in transmitting data, its transmission effect will be interfered by the actual environment, resulting in the instability of the network resulting in data packet loss. Therefore, in wireless sensor networks, the biggest challenge to the Internet of things nodes is data integrity protection. It is necessary to study the security of the Internet of things by finding a protection strategy suitable for the limited processing capacity of nodes in the Internet of things limited memory space low tolerance of energy consumption and complexity of the system. In view of this challenge to Internet of things security, this paper deeply analyzes the research status of Internet of things security and the corresponding data integrity protection strategy, from many data fault-tolerant methods, Erasure code technology is chosen as a strategy to protect data integrity in Internet of things environment. Erasure code technology has been widely used in many fields, the technology is more mature and reliable, erasure code technology belongs to forward error correction code. It can encode the whole piece of data, and can recover the lost data in a certain degree of tolerance by decoding operation, which provides a strong guarantee for the integrity and reliability of the data. It can provide integrity detection and error correction functions. In this paper, the most typical Reed-Solomon code in erasure code is used as the data integrity protection algorithm in the Internet of things node, and it is realized by C program. The Internet of things node chooses the newest microcomputer Raspberry Pi, to translate the name "raspberry pie" into Chinese. It is a microprocessor-based ARM motherboard that simulates a video surveillance device in the Internet of things environment. When the network environment is poor, packet loss is easy to occur, the erasure code protection strategy can be enabled. The raspberry node encodes erasure code before sending data to the host, and after sending to the host, it decodes the erasure code. The lost data block can be restored by redundant block, so as to restore the original photo data. After rigorous test, erasure code technology can repair the lost data by encoding and decoding operation in the experiment of poor simulation network environment, and all the performance indexes of the experiment are in line with the characteristics of the Internet of things environment. Therefore, the method proposed in this paper provides a new angle for the protection of data integrity in the Internet of things environment, and has strong feasibility and timeliness, and can be applied to the practical work of society.
【學(xué)位授予單位】:吉林大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP391.44;TN929.5

【相似文獻】

相關(guān)期刊論文 前10條

1 吳雪霽;;把握“物聯(lián)網(wǎng)”時代的三個關(guān)鍵點[J];通信世界;2009年33期

2 秦茜;;物聯(lián)網(wǎng)驟成產(chǎn)業(yè)巨浪 各方大肆追捧恐為時尚早[J];IT時代周刊;2009年Z2期

3 石菲;;物聯(lián)網(wǎng)還有多遠[J];中國計算機用戶;2009年Z2期

4 馬繼華;韓文哲;;物聯(lián)網(wǎng)的未來會變成“空中樓閣”嗎?[J];信息網(wǎng)絡(luò);2009年10期

5 ;物聯(lián)網(wǎng)系列報道之一 理性物聯(lián)網(wǎng)[J];通信世界;2009年40期

6 李鵬;;物聯(lián)網(wǎng)發(fā)展 標準與應(yīng)用先行[J];通信世界;2009年40期

7 李鵬;趙經(jīng)緯;;北郵謝東亮 物聯(lián)網(wǎng)需兩顆紅心一種準備[J];通信世界;2009年40期

8 周雙陽;;尋找物聯(lián)網(wǎng)的制高點[J];通信世界;2009年41期

9 張鵬;;物聯(lián)網(wǎng),十年涅i,

本文編號:2225284


資料下載
論文發(fā)表

本文鏈接:http://www.lk138.cn/shoufeilunwen/xixikjs/2225284.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶36441***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com