Font Size: a A A

The Research On Key Technologies Of Multi Network Terminal Integration Security In Smart Home

Posted on:2016-11-22Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:1108330488973864Subject:Measuring and Testing Technology and Instruments
Abstract/Summary:PDF Full Text Request
The terminals in the smart home will comunicate with each other by different network. They can easily achieve interactive entertainment, information services and intelligent control, to provide more rich service to family members. Home terminal equipment through the network to achieve a variety of household electrical appliances in the home and the interconnection between the external devices, can easily achieve interactive entertainment, information services and intelligent control, to provide more rich service to family members. These terminals are connected to the network, in addition to the security of the original network also introduces the security issues of the converged network. This paper mainly studies the sensor network and the Internet to solve the problem of the integration of user authentication, user authentication problem of WLAN and the mobile Internet, analysis of the security issues of smart television terminal as a representative of the smart terminal with multi network, and puts forward the corresponding solutions.In order to analyze and solve the security problem of multi network fusion terminal in smart home, the research object selects three core network(sensor network, mobile Internet, WLAN) and the terminal of the smart home. The main contents of this paper include: the security of sensor network, the security of sensor network and Internet, the security problem of 3G network and WLAN, and the security of the terminal in the application. Sensor network is the core of data acquisition network, sensor network application is the most important feature of the smart home, it is important for the security of smart home security is very important. The data collected by the sensor network needs to be exchanged with the Internet, which needs to be studied.The research method is to analyze the existing mainstream of the protocol or method, analyze its main principle characteristics and advantages and disadvantages, in the basis of the improvement, and through the analysis and Simulation of the improved protocol and method validation.The research was funded by the National Natural Science Foundation Guangdong Joint Fund: digital home architecture, compatibility theory and technology research(U0835004); National High-tech R&D Program(863 Program): Research and verification of the key technologies of the new generation of digital TV(2012AA011706).Paper includes four parts:Firstly, this chapter focuses on network architecture of sensor networks, the main threat model, and common access control of sensor network. On the basis of in-depth research on traditional sensor network access control, one-way hash chain based access control schemes is proposed in order to solve the issues that the current access control scheme based on public key cryptography is high in expenses, and difficult to resist node capture, query replay and Do S. Also in order to increase the number of users and access capability, the scalability and user resistance capture attacks, the access control and user access revocation, related mechanism unchanged in overhead improves the security, with more extensive application scenarios.Secondly, this chapter focuses on the security problem of sensor networks and the Internet. The main security problems in the integration are analyzed, and the security issues of the dynamic user authentication protocol are studied.A new dynamic user authentication protocol is designed.In the same time, the improved protocol can enhance the ability of defending against the attack of the camouflage gateway, the ability of denial of service attack, and the update of password.Thirdly, this chapter focuses on the issues WLAN-mobile communication networks.To solve this problem; select 3G as the representative technology of mobile communication. Analyses the available solutions: EAP-AKA(expansibility authentication and protocol) which filed by the Third Generation Partnership Project(3GPP) organization. Point out disadvantages of protocol(EAP-AKA) which include the authentication delay bottleneck due to multiple requests and interaction when WLAN UE constantly switching among different WLAN. The paper introduces WAPI certificate authentication mechanism which is our own intellectual property, and proposes WAPI- mobile communication interworking structure model as a complement to existing models. The access authentication protocol(EAP-WAPI) is designed based on the model. The analysis and simulation results show that compared to the formal WAPI authentication protocol WAPI-XG1,the protocol EAP-WAPI improves the process of authentication interaction and the implementation efficiency.Finally, this chapter analyzes the security problem of the integration terminal which is based on the increasingly intelligent.I choosed the smart TV terminal as the representative products, and pointed out the security threats and security architecture of smart TV.The architecture and process of identity authentication management system is designed.Smart TV security issues and threats analysis of the part of the content is to be absorbed into the smart TV industry standards, the design of the security system has provided an effective material for the development of standards. At the same time, it also makes a useful exploration and attempt to transform the research content to the standard.
Keywords/Search Tags:sensor networks, WLAN-3G, smart home, smart terminal, security
PDF Full Text Request
Related items