Abstract:

In order to solve the problems of complex experiment management, complicated teaching task arrangement, limited student experiment conditions, and to provide a high efficiency of experiment teaching and security experiment environment for the majority of teachers and students, this paper investigates and analyzes the present situation of experiment management in colleges and universities. Based on the analysis of the general problems of experiment management and the practical requirements of experiment management, this paper studies the technical principle and the main function of the security experiment management system for IOT(Internet of Things). Finally, the structural design of the IOT security experiment system is expounded, which is divided into experiment management platform and IOT security platform. It improves the security experiment system for IOT greatly.
Date of Conference: 24-26 July 2017
Date Added to IEEE Xplore: 02 November 2017
ISBN Information:
INSPEC Accession Number: 17334750
Publisher: IEEE
Conference Location: Dalian, China
 
SECTION I.

Introduction

In recent years, experiment teaching plays an increasingly important role in the teaching of colleges and universities. It not only exercises the students' practical hands and innovation ability, but also cultivates the team spirit of the students. This kind of experiment teaching can not replaced by other teaching. However, with the expansion of the number of college students and the expansion of the scale of experimentequipment, which makes the students, experimentequipment, information management and experiment teaching task arrangements become very cumbersome, so the experiment teaching schedule has brought a great trouble, compared to the traditional Internet of things security experimentsystem can not fully meet the current experiment teaching requirements, and affect the efficiency of experimentteaching[1]. Therefore, in the experimentteaching [2]–[3][4] how to facilitate the implementation of the experiment, enhance the experimentresults and enhance teachers in the experiment teaching of the experimenttask schedule, management and experimentassessment capabilities, but also to improve the comprehensive ability of students, This is also the country's colleges and universities are very concerned about the problem, but also to strengthen the school experimentsafety information management imminent problem.

SECTION II.

Analysis of Safety Experiment Modules

(1) RFID (Radio Frequency Identification) Experiment

The RFID experimentfunction module including theregister access experiment, RFID continuous card search experiment (without anti-collision), RFID continuous card experiment (with anti-collision), label lock experiment, label KILL command experiment and label encryption experiment[5]. The purpose of RFID experiment is make students understand the experimentworking principle, such as RFID continuous search card experiment, through the experiment enable students to master through the CC2530 chip to control RMU900 +, so as to achieve through the RFID-900 module for continuous card operation. The tag's encryption experiment allows students to master the cryptographic mechanism of RFID tags and encrypt the RFID-900MHz tags by controlling the RMU900 + module.

(2) TinyOS Experiment. The TinyOS Experiment

Function module contains the work channel monitoring experiment, routing topology detection experiment and flood attack experiment. Through this experiment can help students understand how to achieve on the TinyOS base station and the wireless communication between nodes. Such as the work channel monitoring experiment, through the experiment so that students can get to know the wireless communication-related interfaces and components, and master how to send and receive messages, and can use the base station to complete the work channel monitoring, using the correct baud rate monitoring TinyOS node. The routing topology detection experiment enables students to build a test network and use the AODV (Ad hoc On-demand Distance Vector Routing) routing protocol for basic communication between nodes. The base station is used to probe the network topology and understand the main principles of the AODV routing protocol in the wireless sensor network and to master its implementation [6]–[7].

(3) Zigbee Experiment. In the Zigbee Experiment

Function module, including channel monitoring experiment, packet transmission success rate experiment, network detection experiment, point-to-point RF(Radio Freqency) communication encryption and decryption experiment and peer-to-peer authentication experiment. Through the study of this experiment, students understand the protocol specification of CC2530 chip receiving data frame and the setting method of CC2530 chip receiving mode, so that the node can monitor the communication packet of target network in the channel. Such as channel monitoring experiment, through the experiment enable students build goals and monitor the two networks, achieve the monitoring network, receive the target network communication packets, familiar with the CC2530 packet collection mechanism. The packet success rate experiment enables students understand the basic principles of CC2530 chip RF communication, and on the basis of communication, the method of detecting the success rate (or failure rate) of the data packets sent by the computing node. Through the experiment, the realization of the normal communication between the two points, while real-time calculation of the current success rate (or failure rate). The network probing experiment familiarizes the student with the basic structure of the communication packet and the method of listening to the network packet. In the normal target communication network environment, through the monitoring of the target network communication packet, complete the analysis of the packet, and analyze the target network topology and display [8]–[9][10].

SECTION III.

Principle and Implementation of Security Experiment Management System for Internet of Things

3.1 System Architecture and Composition

The security experimentmanagement system software of Internet of Things contains the experimentmanagement platform and Internet of things security experimentplatform; The hardware contains three major types of experiments, including RFID experiments, TinyOS experiments and Zigbee experimentcomposition. As shown in Figure 1.

Fig.i.

Architecture for security experiment management system of internet of things

View All

The security experiment management system of Internet of Things can provide the students with the implementation environment of the Internet of Things security experiment, the guidance, management and examination of the students ‘experiments, so as to facilitate the experiment implementation, enhance the experimenteffect and enhance the teachers’ ability to deploy, manage and evaluate the experiment process.

3.2 Internet of Things Security Experiment Platform

Internet of Things security experiment platform is the core of the whole system. It is composed of data interaction module, experimentevaluation module and experimentdemonstration module. Theoverall interface design of security experiment platform of Internet of Things is shown in Figure 2.

Fig. 2.

Theoverall interface design of security experiment platform of internet of things

View All

(1)

(1) Data Interaction Module

The data interaction module includes two parts: serial data interaction unit and data analysis unit. In the serial data interaction unit, the data are sent to the RFID experiment, TinyOS experiment and Zigbee experiment at fixed time. In the data analysis unit, the obtained experimentstate and identification are analyzed by the data analysis unit.

(2)

(2) Experiment Display Module

The experiment display module includes the data display unit and the topology display unit. The data display unit displays the information of the feedback during the printing experiment, the experimentstate and the error message during the experiment upload. In the topology display unit, the target network topology formed in the ZigBee experiment and the node topology formed in the TinyOS experiment such as the flood attack experiment are mainly shown in the experimentprocess.

(3)

(3) Experiment Evaluation Module

The experiment evaluation module includes two parts: the data analysis module and the experimentstate reporting unit. In the data analysis unit, the experimentexperiment will be analyzed and the experimentstep status will be judged. The experimentresults will be uploaded to the server through the experimentstatus reporting unit.

The security experiment platform of Internet of Things mainly composed by the RFID experiment, TinyOS experiment and Zigbee experiment. of experiments. The security experimentplatform of Internet of things shown in Figure 3.

Fig. 3.

The security experiment platform of intemet of things

View All

3.3 Experiment Management Platform

Experimentmanagement platform mainly composed of administrator module, teacher management module and student management module. The experimentmanagement function is shown in Figure 4.

Fig. 4.

Experimentmanagement platform

View All

(1)

(1) Administrator Module

Administrators can increase professional information and class information, and view all teachers' and students' experimentimplementation information and decide whether to allow anonymous login.

(2)

(2) Teacher Management Module

Teachers can increase student information (information can be input with a fixed format), customize the experimentcategory and experimentcontent, edit custom experiment, select experiment, open or close the experiment (students need to judge and can only implement the experiment when the experiment opens), meanwhile teachers can manage the experimentprocess, such as to check the online status in student experiment group, to know the experiment content in student experiment group, view the experiment process in student experiment group and view the screen in student experiment group (screenshot).

(3)

(3) Student Management Module

The student experiment group can implement the experimentcontent that teacher opened, and can view the experimentprocess in the course of the experiment. The process starts from the opening of experimentenvironment and ends with the closing of experimentenvironment.

In the experimentmanagement system, students log in the experimentmanagement system first, if log in successfully, then select the corresponding experiment to start the implementation of experimentplatform. During the course of the experiment, teacher can make a experimentmanagement of students' log in information, online information, step information, screenshot information and interactive information. At the same time, teacher can also make a access management of students' attendance information, experimentcompletion information and experimentreport evaluation information. The students would submit the experimentreport after they finished the corresponding experiment, and then teacher evaluates according to the experimentreport and finally the students withdraw from the system. The overall system flow chart shown in Figure 5.

Fig. 5.

System overall flow chart

View All

SECTION IV.

Application Scenarios of Security Experimental Platform of Internet of Things

The application scenario includes teachers, server, the experimentgroup and the corresponding experimentenvironment. The student experiment group and the teacher are connected through the LAN(Local Area Network) router and the server. The teacher sends the experimenttask and material to the student through the server to observe and judge the students' experimentprocess. And then students report experimentstatus and experimentresults.

Fig. 6.

Application scenarios of security experimental platform of internet of things

View All

SECTION V.

Internet Security Experimentplatform Application Scenario

Experiment teaching now plays a significant proportion in college and university teaching. Through the deep survey and study of college and university teaching, in order to solve the problems of teacher's experimentmanagement, the complicated task of the experiment and the inconvenient operation of the students' experiment, the experiment teaching of “Internet of Things” came out. The system uses a variety of network technology to achieve and ensure the system structure stability and safety. Due to the clear laboratory layout, grouped student management, task-based experiment distribution, experimentprogress intuitive and easy to assess the characteristics of the experiment, so that the experimentmanagement and operation became more convenient.

Through the design of the system platform, it improved the teacher's experiment teaching task arrangement efficiency, made students' experiment operation more convenient and intuitive, and improved the students' experimentlearning efficiency.

IoT experitment的更多相关文章

  1. 《连载 | 物联网框架ServerSuperIO教程》-4.如开发一套设备驱动,同时支持串口和网络通讯。附:将来支持Windows 10 IOT

    1.C#跨平台物联网通讯框架ServerSuperIO(SSIO)介绍 <连载 | 物联网框架ServerSuperIO教程>1.4种通讯模式机制. <连载 | 物联网框架Serve ...

  2. 开源物联网框架ServerSuperIO 3.0正式发布(C#),跨平台:Win&Win10 Iot&Ubuntu&Ubuntu Mate,一套设备驱动跨平台挂载,附:开发套件和教程。

    3.0版本主要更新内容: 1.增加跨平台能力:Win&Win10 Iot&Ubuntu&Ubuntu Mate 2.统一设备驱动接口:可以一套设备驱动,跨平台挂载运行,降低人力 ...

  3. 开源物联网通讯框架ServerSuperIO,成功移植到Windows10 IOT,在物联网和集成系统建设中降低成本。附:“物联网”交流大纲

    [开源]C#跨平台物联网通讯框架ServerSuperIO(SSIO)介绍 一.概述 经过一个多月晚上的时间,终于把开源物联网通讯框架ServerSuperIO成功移植到Windows10 IOT上, ...

  4. 玩儿转物联网IoT - 在Beagle Bone Black上运行node.js 程序

    物联网(IoT)技术方兴未艾,智能手环,智能血压计,智能眼镜甚至智能鞋垫都开始进入我们的生活,各种智能设备层出不穷,世界已经到了一个"人有多大胆,地有多大产"的时代,不玩儿点物联网 ...

  5. Win10 IoT C#开发 4 - UART 串口通信

    Windows 10 IoT Core 是微软针对物联网市场的一个重要产品,既可以开发设备UI与用户交互式操作,又可以控制GPIO等接口,使得原来嵌入式繁琐的开发变得简单.通过Remote Debug ...

  6. Azure IoT带来更高效的新能源生产和会看人脸色的无人超市

    全球分析机构都认为物联网将在未来几年呈现爆发式增长,到2020年,各种传感器.新型物联网设备,再加上传统PC.智能手机.平板电脑.网络电视,以及各类可穿戴智能设备,将交织成一个由300亿到500亿台设 ...

  7. 《Windows IoT 应用开发指南》

    物物互联的时代已经到来,智能家居.智慧校园.智慧交通.可穿戴.无人机.全息投影,各种各样的新名词.黑科技层出不穷.当我们为五年前能够通过手机控制家电而欣喜若狂的时候,可曾憧憬过当前使用增强现实设备完成 ...

  8. Microsoft IoT Starter Kit 开发初体验

    1. 引子 今年6月底,在上海举办的中国国际物联网大会上,微软中国面向中国物联网社区推出了Microsoft IoT Starter Kit ,并且免费开放1000套的申请.申请地址为:http:// ...

  9. Windows 10 IoT Serials 3 - Windows 10 IoT Core Ardunio Wiring Mode

    Maker社区和智能硬件的朋友一定知道Arduino,很多3D打印机都是用它做的.为了迎合这一大块市场,微软在基于Intel Galileo的Windows 8.1 IoT中就是使用这种基于Ardui ...

随机推荐

  1. webmagic爬虫抓取工作室成员博客

    一.导入依赖 <!--webmagic依赖--> <dependency> <groupId>us.codecraft</groupId> <ar ...

  2. 踩坑之路---JWT验证

    使用JWT验证客户的携带的token 客户端在请求接口时,需要在request的head中携带一个token令牌 服务器拿到这个token解析获取用户资源,这里的资源是非重要的用户信息 目前我的理解, ...

  3. 西安理工大学 李爱民 Xi'an University of Technology, Aimin Li

    李爱民-西安理工大学计算机科学与工程学院 ● 简介(Introduction)-> 李爱民(Aimin Li),男,湖北随州人,西安电子科学大学博士(PhD),中共党员.中国计算机学会会员,CS ...

  4. 【转】LVDS基础、原理、图文讲解

    转自:https://blog.csdn.net/wangdapao12138/article/details/79935821 LVDS是一种低摆幅的差分信号技术,它使得信号能在差分PCB 线对或平 ...

  5. Java并发编程的艺术· 笔记(1)

    目录 1.volatile的原理 2.Synchonized 3.无锁-偏向锁-轻量级锁-重量级锁 4.Java实现原子操作 1.volatile的原理 如何保持可见性: 1)将当前处理器缓存行的数据 ...

  6. MIUI8系统完整刷入开发版开启root权限的经验

    小米的机器不同手机型号一般情况官网都提供两个不同的安卓系统版本,可分为稳定版和开发版,稳定版没有提供root超级权限管理,开发版中就支持了root超级权限,很多情况我们需要使用的一些功能强大的APP, ...

  7. 使用npm私有服务器保存公司内部强业务类型组件(三):关于业务性组件的一点思考

    编写业务性组件最难的地方不在于技术,而在于沟通, 1:前端将业务给封装了起来,必然导致产品在设计的时候多了一层考虑,在新增功能的时候 他要考虑这个功能是不是在其他项目也需要,如果不是的话,就不应该放在 ...

  8. Python+turtle交互式绘图:可以用鼠标拖动的小海龟

    下面是我画海龟的过程: (1)打开python: 2.调用turtle库,先设置一些基础设置,与一个画龟的函数 from turtle import Screen,Turtle,mainloop cl ...

  9. Log4Net 常见格式说明(不断更新中)

    用户名  %username pc版本 另起一行 %newline

  10. [GXOI/GZOI2019]与或和

    考虑拆位,计算每一个二进制位的贡献. 问题转化为求一个01矩阵的全0/1的子矩形个数. 考虑计算以第i行第j列为右下角的合法子矩形个数. 发现合法的左上角范围向左是单调下降的. 可以用一个单调栈来维护 ...