Font Size: a A A

Research On The Key Problems Of Privacy Protection And Key Management In The Internet Of Things

Posted on:2013-09-05Degree:DoctorType:Dissertation
Country:ChinaCandidate:T YanFull Text:PDF
GTID:1228330374999509Subject:Cryptography
Abstract/Summary:PDF Full Text Request
The security features of The Internet of things (IOT) reflect that the diversity of sensory information, the complexity of the network environment and the diversity of application requirements. It also proposes greater challenges for the security research such as privacy protection and key management in the IOT. This paper focus on the content of the key security issues in the Internet of things. By perception layer, network layer and the application layer three part of the research as the main line, we consider the security problems of perception layer, network layer and the different business in application layer, aim to further improve and build a more security, more efficient content the Internet of things security system. It makes more concrete plan that can satisfy the different application needs. The main research results of our paper are as follows:1、In view of the current domestic and foreign general IOT architecture system, we analysis and put forward the content IOT security system. The whole thing for the construction of IOT security architecture, we need to considere the security problems produced by sensors networks combined with the traditional network. There are huge numbers of nodes in the IOT perception layer. The large amount of data transmission caused by the huge numbers of nodes may cause congestion and denial of service attacks in network layer, etc. The security issues in application layer include such as IOT business of security scene and security mechanism of business system, etc.2>. We propose a secure Mobile RFID architecture for the Internet of Things. A mobile RFID system is a new service using a mobile device like RFID reader and wireless internet. Most users can widely use a mobile RFID system. However, mobility and universality of a mobile reader will cause some additional privacy threat. In our model, even if the enemy monitoring the communication between tag and reader, he cannot obtain the user’s object information, or track to the position of specific tag’s owner.3> We implement a TTP (Trust-Third-Party) based key management protocol to construct a secure session key among the tag, reader and server to construct a security Mobile RFID (Radio Frequency Identification) service based on the IOT(Internet of Things). A smart mobile phone with a RFID reader can provide Mobile RFID (MRFID) services based on RFID tagged objects. While the mobile RFID system has many advantages, the privacy violation problems at reader side, consumer tracking with malicious purpose and the sensitive information transmission problems among Tag, Reader and Server, are deeply concerned by individuals and scholars. The proposed idea is security and efficiency and supply three advantages for a secure IOT architecture.4^We propose mutual authentication and session key exchange protocols based on certificates for the Internet of Things. We also propose an improved version for the conventional certificate-based systems. Our protocol is more efficient than the others in that it requires fewer messages and only one session key. It gives use a new method to deal with such as preventing tampering and preventing interference security problems. In designing the security protocol proposed here, the low computational power of the wireless sensors nodes and the low bandwidth of the wireless networks are considered. It is good as low computational complexity and cannot be forged.
Keywords/Search Tags:the Internet of things, the security of the Internet of things, radio frequency identification, wireless sensor networks, certificate-basedpublic key cryptography, privacy protection
PDF Full Text Request
Related items