International Core Journal of Engineering 2020-26 | Page 183

the authenticity of the certificate. If the verification succeeds, the local certificate is sent to the gateway. After the identity verification of both parties is completed, the VPN encrypted tunnel can be established. Fig12. Test the round-trip latency of 100 ICMP packets VI. C ONCLUSION The rapid development of the IoT technology has brought profound changes to the society. More and more terminal intelligent devices are connected to the network. If the security of the IoT system cannot be effectively guaranteed, the deployment and application of the IoT technology cannot achieve significant development. IoT gateway is the key link of the interaction between the perception layer and the application layer, which plays an important role in ensuring the security of the IoT system. Based on previous studies, this paper proposes a data transmission protection scheme combining PUF technology and IPSec VPN using China cryptographic algorithm, and carries out specific implementation and deployment tests. The results show that the gateway is convenient to deploy and flexible to configure, which can effectively improve the network security on the basis of meeting the general communication requirements and transmission rate of the IoT system. Fig9. Gateway certifies Server certificate Fig10. The server verifies the user certificate at the gateway C. Performance Test and Results Testing of gateway performance is primarily a test of latency, throughput, and stability. Start iperf in the terminal of the IoT server, and then log in to the gateway system. In the terminal tool of the gateway system, enter: iperf -c 192.168.32.1 -i 2 -t 30, -c to start in client mode. The test results show that under the VPN tunnel, the TCP throughput reaches an average of 95 Mbits/s. A CKNOWLEDGMENT This research was financially supported by the National Key Research and Development Plan (2018YFB1004101), Key Lab of Information Network Security, Ministry of Public Security (C19614), Special fund on education and teaching reform of Besti (jy201805), the Fundamental Research Funds for the Central Universities(328201804, 328201910), key laboratory of network assessment technology of Institute of Information Engineering, Chinese Academy of Sciences. R EFERENCES [1] [2] [3] Fig11. Test TCP throughput results after establishing a VPN tunnel [4] After establishing a secure tunnel connection, log into the home gateway system and use ping command to test the delay of VPN server Intranet host PC1 (192.168.32.100). Through testing 100 ICMP packets: ping 192.168.32.100-c 100, as shown in the figure, in the VPN tunnel established by this gateway, the average round-trip delay is 4.145ms, the shortest is 2.860ms, and the longest is 4.680ms. Send 100 packets with a loss rate of 0. [5] [6] [7] [8] [9] 161 Frustaci M, Pace P, Aloi G, et al. Evaluating critical security issues of the loT world; Present and Future challenges[J]- IEE Internet of Things Joumal, 2017, PP(99):1-L. Siegel J E, Kumar S, Sarma S E. The Future Internet of Things: Secure, Eficient, and Model- Based[J]. IEEE Internet of Things Journal, 2017. SUN Chuang,WANG Ying-guan,LI Zhen-wei. Network fusion model based on wireless sensor network and mobile communication networks[J]. Modern Electronics Technique,2013,36 (07):4-7+10. YE Gaoyang,BI Ran. Design and implementation of smart home system based on Internet of things[J].Journal of Computer Applications, 2014,(S1):318-319. +351. Xin Hailiang,Zhong Peisi,Zhu Shaoqi,Yu Yingjing.Research of smart home furnishing control system by Internet of Things based on ZigBee[J].Measurement Control Technology and Instruments, 2013, 39( 12):79-81. FENG Jianfeng.Design of Smart Home System Based on ARM and ZigBee Technology[D].Jilin University, 2014. WANG Lei,HE Yong,ZHANG Yu,KONG Weitian.Design and application of portable voice system based on smart home[J].Computer Engineering and Design,2018,39(05):1290-1295. XU Zhexin,ZHANG Yilin,LIN Xiao,WU Yi. Design of Smart Home Router Based on OpenWrt and ZigBee[J]. Computer Engineering, 2017, 43(03):94-98+104. Becker G T. On the pitfalls of using arbiter- PUFs as building