Font Size: a A A

Researches On Key Problems Of Security And Privacy Protection Under Internet Of Things

Posted on:2015-09-02Degree:DoctorType:Dissertation
Country:ChinaCandidate:J S ZhangFull Text:PDF
GTID:1228330467464303Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In recent years, as an important part of the next generation of informa-tion technology, Internet of Things (IoT) has obtained rapid development. The scope of its application is broad, in the areas of environmental monitoring, personal health care, intelligent transportation, food traceability, logistics and supply chain management, etc. Although IoT makes our life convenient, it al-so faces many challenges. One of the most important challenge in IoT is the security problems. The IoT technology is at an early stage of development. Therefore, the security architecture based on IoT has not been set up. In addi-tion, although IoT can be seen as an extension of the exist Internet and some security technologies and strategies used in the exist Internet is also used in IoT, it still has some special security problems that cannot resolve by the exist security technologies. For example, the IoT system contains a large number of intelligent terminals which with enormous difference in terms of function, computing and communication capacity. This makes it difficult to design the security mechanism. The architecture of IoT is still in the process of continued evolution. Therefore, we cannot provide a unified security architecture based on IoT. The existing researches on IoT security are based on the specific IoT technology and application scenarios (e.g., RFID, WSNs etc.) and then give feasible solutions according to the different scenarios. In this paper, we first analyse the different specific technologies and application scenarios, then give the security requirements and propose the specific security solutions based on these specific technologies. The main research results include:1. Based on the security issues that user access to the server system via the wireless channel in the environment of IoT, we proposed a remote user authentication scheme based on elliptic curve encryption. Unlike other ECC-based authentication schemes, the proposed scheme uses ECC in combination with a secure hash function to protect the secure communi-cation among the users, the servers and the registration center, which can reduce the use of ECC operations in the authentication phase, and make it possible to significantly reduce the computational cost. This makes the proposed scheme is more suitable for using on the limited computing power equipments.2. Due to the limited power supply of the sensor nodes, some researches have introduced the mobile sink into the resource-constrained WSNs to prolong the sensor network’s lifetime. However, almost all of the existing schemes focus on the mobility strategies of the mobile sink and few studies men-tioned the security issues of using mobile sink in the resource-constrained WSNs.Therefore, we present a bilinear pairing based authentication and key agreement scheme for the authentication between mobile sinks and cluster head in WSNs.3. Participatory sensing applications rely on the participants to share their sensing data to the application server. Therefore, how to ensure the pri-vacy of the participant is an important issue. Besides, incentive mecha-nism is needed to maintain the participants’enthusiasm and the design-er requires the participants’identity to implement incentive. However, the identity is an important aspect of personal privacy. In this paper, we present a pseudonym-based privacy protection scheme that takes both pri-vacy protection and user incentive into consideration.4. we propose a novel authentication protocol conforming to the EPC C-1G-2Standard. The proposed an authentication scheme can withstand var-ious common security threats in the environment of RFID system. RFID technology is an important part of IoT. However, because of the constraint of computing and energy supply about RFID tag, We cannot use the exist- ing various security authentication scheme deployment in the RFID sys-tem directly. Thus, we proposed a low computational cost authentication scheme can withstand various common security threats in the environ-ment of RFID system.
Keywords/Search Tags:Internet of Things security, Privacy protection, Authentication, Key agreement, RFID, WSNs
PDF Full Text Request
Related items