Font Size: a A A

Research On The Security Of Internet Of Things Terminals

Posted on:2020-05-21Degree:MasterType:Thesis
Country:ChinaCandidate:Y X ZhangFull Text:PDF
GTID:2428330590495426Subject:Information security
Abstract/Summary:PDF Full Text Request
Due to the broad coverage,various applications,and deep communication dimensions,widely attention has been attracted on the Internet of Things.Fields in Internet of Things cover Radio Frequency Identification(RFID),cloud computing and so on,which have laid a solid foundation for the direct interaction of information between different objects.Radio frequency identification technology can read object data information in a non-contact manner with high production circulation efficiency and precise control capability,so it has a large number of applications in logistics,transportation,etc.;while cloud computing technology allows organizations and individuals to complete complex data processing through the cloud's enormous computing power and storage resources,which carries out ciphertext retrieval and outsourced computing.However,the development of these two technologies has also brought different security challenges,including data privacy,verifiability,and efficiency in terminals.This paper mainly studies the existing RFID authentication protocols,searchable encryption,and outsourcing operations,also focuses on RFID key tree protocol design,public key searchable encryption scheme and modular exponentiation outsourcing scheme.The main research results of the thesis include the following three aspects:(1)At present,a large amount of research has been focused on optimizing the key-tree,yet none of them considers the storage constraints.To solve this problem,we introduce a new privacy metric expression for measuring the resistance of the system to a single compromised member;we furtherly extend the research work to show how to construct the key-tree in order to maximize the system's resistance to single member compromise under the constraints on the tags'number,the maximum authentication delay and the number of the keys stored in the tag.(2)Considering the dishonest cloud server could raise the Inside Keyword Guessing Attack(IKGA),we propose a new high-efficiency anti-IKGA public-key searchable encryption scheme.Based on the modified DLIN assumption,we prove the safety and correctness of the new scheme.Experiment and analysis results show that this scheme possesses better performance and safety advantages.(3)For the modular exponentiation like R=u~a(mod N),the existing outsourcing scheme design often ignores the privacy requirements of specific scenarios and parameters,instead,the design protects the privacy of all four parameters R,u,a,N,which results in high complexity.In view of this,we have designed different modular outsourcing schemes for different scenarios,which convert the original modular power operation into a new operation through reasonable logical division,ensuring that the privacy parameters in a specific application scenario can be correctly protected during the whole computing process,and the user's verifiable probability can reach one.The results of the experimental simulation show that the user-end cost is greatly reduced.
Keywords/Search Tags:Internet of Things, Terminal Security, RFID, Searchable Encryption, Modular Exponentiation
PDF Full Text Request
Related items