Examination on Security Performance Analysis Model of Internet of Things Assigned Based on Composite Security Key
Rapid development of Internet of Things technology makes the Internet interact and communicate with objects in the real world. The diversity of Internet of Things’ system architectures and the diversity of networks determine the complexity of their security issues. A key step in building an Internet of Things’ security system is to build a model and evaluate threats of security. First, this paper studies the distribution of key security about mobile ad hoc networks and analyzed the characteristics of the scene. To promote the certification of the key exchange strategy of both sides, it supports key exchange between the core node and multiple nodes for existing problems that management scheme of random key preallocation is limited by the storage space of the node through combination of key matrix elements which has less information to generate a large number of keys, and each sensor node only needs to store related parameters and key matrix. It saves the memory space of node greatly. The results of simulation show that the program has a strong security; it can fight against the common attacks of wireless sensor networks, such as node forgery attacks, message replay attacks, and denial of service attacks. At the same time, it is superior to traditional solutions in terms of network connectivity and nondestructibility, which can apply clustered wireless sensor network massively.