Font Size: a A A

Reserach On Security Issues Of Internet Of Things And Their Applications

Posted on:2012-10-28Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y J WangFull Text:PDF
GTID:1228330374499597Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the development of information technology, Internet of Things (IoT) gradually becomes the third innovation wave of Information Technology. The Internet of Things, based on traditional Internet, can realize the information exchange from human to things and things to things in its long-term. However, subject to the terminal equipment, network structure, communication methods and application scenarios, its security issues cannot be directly resolved through the existing Internet security techniques.By comparing the IoT with the Internet, described the difference and relationship between IoT layered model and OSI layered model. The security characteristics in the typical scenario in IoT are analyzed. In this paper, several security issues have been discuzed and studied, mainly including:1. Currently object access control measures can be implemented in the OSI model for the target object in the horizontal dimension, but in the OSI model of the vertical dimension is lack of access control for the target object. Combining with the process of addressing privacy issues in IoT enviroment, we proposed safe-addressing model and several protocols for the Internet of Things. On the one side, these protocols do not change the implementation of communication protocols in the public domain; on the other side, the problem of vertical transmission identities in the OSI model has been effectively resolved.2. By the improvements of R.C. Merkle’s key agreement protocol, we proposed a key agreement protocol based-on the unique identifier of object--IB-Merkle. The protocol can be widely applied to different object identifier or items coded system. The IB-Merkle protocol also can be applied in unsafe channel. Through cryptography encryption/decryption technology, the protection of the Puzzle was significantly improved. On the one hand, the adjustment of key length can exponentially increase the difficulty an attacker to crack the Puzzle; the other hand, increasing the number of total Puzzles can quadratically increase the amount of time of cracking.3. With the safety addressing model and the IB-Merkle key agreement protocol, we proposed a cross-domain object access protocol for the IoT’s network enviroment. Application scenarios in the Internet of Things, different objects or human beings tend to belong to different application domains; In addition, the storage spaces, computing resources of smart devices are limited. They can not save a large amount of information, such as security policy, account and so on. Through the cross-domain object access protocol, not only can support the human-device, device-device single-domain/multi-domain accessing needs, but also the session key for the two communication entities has been agreed against the IB-Merkle protocol. The identity of the target device requester in the target side has been confirmed.
Keywords/Search Tags:internet of things security, key agreement, identityauthentication, cross-domain accessing, privacy protection
PDF Full Text Request
Related items