首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
电力物联网网关入侵检测方法由于检测数据预处理效果差,导致物联网的入侵检测效果不佳,文章提出基于区块链技术的电力物联网网关入侵检测方法。通过特征选择、特征降维、属性规范化步骤预处理电力物联网网关的检测数据;基于区块链技术识别入侵数据,均衡检测数据区块节点负载防止节点过载,根据节点异常分数值获取异常节点,实现电力物联网网关入侵检测。实验结果表明,该方法的电力物联网网关入侵检测准确率达到了95.54%、F1值为95.09%,其具有良好的入侵检测性能。  相似文献   

2.
随着区块链技术的不断发展,其应用变得越来越普及。文章主要针对区块链的数据结构及整体架构进行分析,并审视了区块链为物联网带来的挑战;最后从物联网数据交易系统方面、电网管理方面、车联网方面以及防伪安全管理方面,细化阐述了基于区块链的物联网技术应用,以期为基于区块链的物联网技术发展提供可靠支持。  相似文献   

3.
文章对基于区块链技术的物联网信息共享安全相关理论及信息共享安全框架进行了分析,介绍了信息感知层、数据传输层、技术应用层信息安全的基本情况,从区块链技术应用方面进行了论述,提出了双链模式的物联网信息共享安全防护方法,对双链模式构建策略和物联网超级账本安全架构方法进行了研究。仿真实验证明,该模式能够增强抗攻击能力,提升数据区块链性能和交易区块链性能,达到良好的物联网信息共享安全防护效果,解决了物联网信息共享的安全问题。  相似文献   

4.
针对物联网源端数据在传输过程中易被篡改、可信度低等痛点,结合区块链技术分布式存储、数据可溯源、不可篡改等特性,在传统的物联网数据传输方式的基础上,研究了基于区块链高速共识方法的物联网源端数据存储方式。将区块链共识节点部署在采集侧的区块链物联网关,并使用区块链对采集传感器设备进行身份认证,保证数据只能由经过区块链认证的设备上链,确保数据从源头可信。同时将区块链共识节点部署于服务器机房和物联网采集侧,保证了当采集侧区块链共识节点由于故障断开连接时,区块链网络仍能稳定运行。同时,研究并优化了区块链主节点选举方法和共识方法,以达到提高联盟链稳定性和数据传输安全性的目的,实现物联网采集数据从源头到存储全程可信、可控、可溯源。  相似文献   

5.
阐述通信协议的设计和开发是物联网研究工作中的重要一环,针对物联网中网关和云端之间的通信,设计了一个基于MQTT消息协议的物联网通信协议。为了保证存储在云端中数据不被恶意篡改,提出在数据传输过程中使用区块链技术来保护传输数据的方案。这一方案具有轻量、高效、易于实现的特点,有利于保护物联网数据的安全性。  相似文献   

6.
为了提高物联网区块链数据挖掘能力,需要进行数据优化聚类处理,提出基于深度学习的区块链数据分片峰值聚类算法.采用异构有向图分析方法进行物联网区块链数据存储结构设计,结合特征空间重组技术进行物联网区块链数据结构重组,提取物联网区块链数据的关联信息特征量,采用语义相关性融合的方法进行区块链数据特征提取和自适应调度,对提取的物联网区块链数据特征量进行模糊聚类处理,采用模糊C均值聚类方法进行物联网区块链数据的网格分片峰值聚类和属性分类识别,采用深度学习方法进行数据聚类过程中的分片峰值融合和聚类分析,实现区块链数据分片峰值聚类.仿真结果表明,采用该方法进行区块链数据分片峰值聚类的收敛性较好,误分率较低,自适应学习能力较强.  相似文献   

7.
本文以物联网系统为落脚点,首先说明了传统系统的不足,以及在物联网系统中融入边缘计算及区块链技术的必要性,其次详细叙述了物联网、区块链和边缘计算的融合方法,最后立足相关技术,围绕基于边缘人工智能计算及区块链技术的物联网系统的应用场景展开了讨论,并对现存问题和发展趋势进行了分析,供相关人员参考。  相似文献   

8.
龙凤  饶玮 《长江信息通信》2024,(2):23-24+29
基于DES算法的电力物联网信任网关数据远传加密是指在电力物联网中,通过信任网关对数据进行加密保护,使用DES算法进行数据加密,并通过远传方式将加密后的数据传输到目标节点。针对电力物联网信任网关的数据传输安全问题,提出了基于DES算法的电力物联网关信任网关数据加密的传输方法。该方法在明文数据中加入了可变化的冗余码,既可以提高数据远传加密的可靠性,又可以将每个数据块经过一系列的操作得到密文,可防止数据被篡改提高其安全性。  相似文献   

9.
在基于区块链的物联网数据共享中,区块链要求节点具备大量的存储资源,这极大阻碍了更多物联网设备加入共享。针对这个问题,提出一种适用于物联网数据共享的区块链节点存储优化方案。该方案提出适用于物联网数据共享场景的存储模型,引入部分重复码对实用拜占庭容错算法进行改进,在共识过程中完成区块链账本的优化存储。实验分析表明,该方案能够在保证共识效率和容错性的同时,大幅降低区块链节点的存储开销。  相似文献   

10.
随着物联网技术的广泛应用,大量的RFID和无线传感器需要接入网络,海量的关键信息数据需要通过网络传递,使得物联网相比较传统网络对网络安全提出了更高的要求,因此提出了一种基于SDN的物联网安全架构,利用SDN技术控制与转发相分离、网络虚拟化等特点,整合网络安全资源,从网络全局角度分析安全风险、执行安全策略,将物联网各层面的安全问题进行集中分析处理,简化物联网末端安全设施的部署。在给出基于SDN的物联网安全架构基础上,分析介绍了应用层、控制层、感知层的安全模块和安全策略,最后给出了下一步开展研究工作的重点和方向。  相似文献   

11.
The technological integration of the Internet of Things (IoT)-Cloud paradigm has enabled intelligent linkages of things, data, processes, and people for efficient decision making without human intervention. However, it poses various challenges for IoT networks that cannot handle large amounts of operation technology (OT) data due to physical storage shortages, excessive latency, higher transfer costs, a lack of context awareness, impractical resiliency, and so on. As a result, the fog network emerged as a new computing model for providing computing capacity closer to IoT edge devices. The IoT-Fog-Cloud network, on the other hand, is more vulnerable to multiple security flaws, such as missing key management problems, inappropriate access control, inadequate software update mechanism, insecure configuration files and default passwords, missing communication security, and secure key exchange algorithms over unsecured channels. Therefore, these networks cannot make good security decisions, which are significantly easier to hack than to defend the fog-enabled IoT environment. This paper proposes the cooperative flow for securing edge devices in fog-enabled IoT networks using a permissioned blockchain system (pBCS). The proposed fog-enabled IoT network provides efficient security solutions for key management issues, communication security, and secure key exchange mechanism using a blockchain system. To secure the fog-based IoT network, we proposed a mechanism for identification and authentication among fog, gateway, and edge nodes that should register with the blockchain network. The fog nodes maintain the blockchain system and hold a shared smart contract for validating edge devices. The participating fog nodes serve as validators and maintain a distributed ledger/blockchain to authenticate and validate the request of the edge nodes. The network services can only be accessed by nodes that have been authenticated against the blockchain system. We implemented the proposed pBCS network using the private Ethereum 2.0 that enables secure device-to-device communication and demonstrated performance metrics such as throughput, transaction delay, block creation response time, communication, and computation overhead using state-of-the-art techniques. Finally, we conducted a security analysis of the communication network to protect the IoT edge devices from unauthorized malicious nodes without data loss.  相似文献   

12.
In order to meet various challenges in the Internet of things (IoT), such as identity authentication, privacy preservation of distributed data and network security, the integration of blockchain and IoT became a new trend in recent years. As the key supporting technology of blockchain, the consensus algorithm is a hotspot of distributed system research. At present, the research direction of the consensus algorithm is mainly focused on improving throughput and reducing delay. However, when blockchain is applied to IoT scenario, the storage capacity of lightweight IoT devices is limited, and the normal operations of blockchain system cannot be guaranteed. To solve this problem, an improved version of Raft (Imp Raft) based on Raft and the storage compression consensus (SCC) algorithm is proposed, where initialization process and compression process are added into the flow of Raft. Moreover, the data validation process aims to ensure that blockchain data cannot be tampered with. It is obtained from experiments and analysis that the new proposed algorithm can effectively reduce the size of the blockchain and the storage burden of lightweight IoT devices.  相似文献   

13.
The Internet of things (IoT) is a multiple heterogeneous network,and its perception layer is often faced with various security threats.As the bridge between the perception layer and the network layer,the IoT gateway should have the security management function to prevent the security issue from spreading to the upper layer.According to the current security deficiencies in IoT gateway,a universal IoT gateway security system was proposed based on the IoT gateway middleware technology.Various security protocols or algorithms can be embedded in IoT gateway security system,and the modeling and analysis can help the design and implementation of IoT gateway.The formal modeling and verification of the IoT gateway security system was performed by timed automata.The results show that the IoT gateway security system satisfies the security properties of confidentiality,availability,authenticity,robustness,integrity and freshness.  相似文献   

14.
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems. This research identifies peer-reviewed literature that seeks to utilize blockchain for cyber security purposes and presents a systematic analysis of the most frequently adopted blockchain security applications. Our findings show that the Internet of Things (IoT) lends itself well to novel blockchain applications, as do networks and machine visualization, public-key cryptography, web applications, certification schemes and the secure storage of Personally Identifiable Information (PII). This timely systematic review also sheds light on future directions of research, education and practices in the blockchain and cyber security space, such as security of blockchain in IoT, security of blockchain for AI data, and sidechain security.  相似文献   

15.
随着万物互联时代的到来,面对海量异构终端的互联需求,传统基于应用层网关的协议栈转换方案存在性能差、无法保障端到端安全等问题。提出了一种轻量可信的物联网 IP 通信协议,是网络 5.0产业和技术创新联盟协议与接口组的主要研究方向,避免应用层网关的部署,降低物联网设备的计算与存储开销,保障端到端通信安全。  相似文献   

16.
Healthcare is a vitally important field in the industry and evolving day by day in the aspect of technology, services, computing, and management. Its potential significance can be increased by incorporating Internet of Things (IoT) technology to make it smart in the aspect of automating activities, which is then further reformed in the healthcare domain with the help of blockchain technology. Blockchain technology provides many features to IoT-based healthcare domain applications such as restructuring by securing traditional practices, data management, data sharing, patient remote monitoring, and drug analysis. In this study, a systematic literature review has been carried out in which a total of 52 studies were selected to conduct systematic literature review from databases PubMed, IEEE Access, and Scopus; the study includes IoT technology and blockchain integration in healthcare domain-related application areas. This study also includes taxonomy that mentions the aspects and areas in healthcare domain incorporating the traditional system with the integration of IoT and blockchain to provide transparency, security, privacy, and immutability. This study also includes the incorporation of related sensors, platforms of blockchain, the objective focus of selected studies, and future directions by incorporating IoT and blockchain in healthcare domain. This study will help researchers who want to work with IoT and blockchain technology integration in healthcare domain.  相似文献   

17.

The Internet of Things (IoT) has been making people’s lives more efficient and more comfortable in the past years, and it is expected to get even better. This improvement may benefit from the use of blockchain to enhance security, scalability, reliability and auditability. Recently, different blockchain architectures were proposed to provide a solution that is better suited for IoT scenarios. One of them, called appendable-block blockchains, proposed a data structure that allows to include transactions in blocks that were already inserted in the blockchain. This approach allows appendable-block blockchains to manage large amounts of data produced by IoT devices through decoupled and appendable data structures. Nevertheless, consensus algorithms can impact throughput and latency in scenarios with large amount of produced transactions, since IoT devices can produce data very quickly (milliseconds) while these data might take some time to be included in a block (seconds). Consequently, it is important to understand the behaviour of different consensus algorithms over appendabble-block blockchain in these type of scenarios. Therefore, we adapted the appendable-block blockchain to use and compare the impact of different consensus algorithms: Practical Byzantine Fault Tolerance (PBFT), witness-based, delegated Byzantine Fault Tolerance (dBFT) and Proof-of-Work (PoW). The results show that both dBFT and PBFT can achieve fast consensus (< 150ms) in the context of appendable-block blockchains. We also present a discussion regarding attacks in each consensus algorithm to help one to choose the best solution (considering performance and security issues) for each scenario.

  相似文献   

18.
With the rapid popularization and wide application of the Internet of things (IoT),the security problems of IoT operating system,which is the essential part,become more and more urgent.Firstly,the famous IoT operating systems and their different features were introduced,then it was compared with present embedded systems.Secondly,On the basis of the survey of research related to IoT operating system,the research was discussed and analyzed from the view of building a comprehensive security system,then security challenges and opportunities which the IoT system faced were pointed out,and the research status of the security of the IoT operating system was summarized.Finally,the promising future study directions in the IoT operating system security field were discussed based on the drawbacks of the existing researches,particularly,the IoT system survival technology as a new research direction was pointed out.  相似文献   

19.
With the rapid development of the internet of things(IoT) technology and big data technology,the search engine for internet of things become a hot research topic.However,because of the openness of the search of IoT,the privacy in traditional internet search area become more prominent and face more challenges.Firstly,the research background and challenges of privacy preservation for search of IoT were described.Secondly,the framework of data privacy preservation for search of IoT were presented and several main research domain in this framework were described.Thirdly,several privacy preservation technology appropriated for search of IoT were described in detail,including the background,recent research work,main research directions.Finally,the current problems and important research field for future were presented.  相似文献   

20.
近年来,中国物联网政策支持力度不断加大,技术创新成果接连涌现,各领域应用持续深化,产业规模保持快速增长。本论文以物联网接入边界为切入点,探讨了物联网安全接入问题的解决方案。设计了基于可信计算3.0的物联网可信网关,以及安全管理中心,构建了可信的物联网安全边界接入系统。为各种异构物联网终端设备提供了安全屏障,隔绝了针对于物联网设备的网络安全威胁。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号