Font Size: a A A

Research On The Protocols Of Authentication In Pervasive Computing

Posted on:2014-09-10Degree:DoctorType:Dissertation
Country:ChinaCandidate:J LiuFull Text:PDF
GTID:1268330422480088Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The establishment of trust is the first prerequisite for all kinds of applications based on thepervasive computing environment, because it is on the basis of mutual trust that devices can cooperatewith one another through various ways to provide service for users. We generally can build trustrelationship by such two ways as direct trust and indirect trust, and indirect trust is completed byrecommendation while direct trust mainly by application of all sorts of authentication technologies.Pervasive computing environment has the characteristics of mobility, distributivity, openness,dynamism and uncertainty and so on, which makes the traditional authentication technology notsuitable for being directly applied in the pervasive computing environment, so this paper aims tostudy the authentication technology in the pervasive computing environment and the major researchworks are as follows:(1) Distributed authentication model without key distribute center (KDC) involved is created inthe pervasive computing environment. The traditional authentication protocol of identity-basedencryption (IBE) system is developed into distributed authentication protocol, without KDCparticipated in its implementation and the distributed junctions of various authentications coordinatewith one another to complete from the distribution phase of the system’s key to the generation of theuser’s key and then to the authentication interactive process, making every authentication junction getrelatively smaller operation and traffic. Meanwhile the threshold distributed authentication protocol iscreated with the construction method of vector space threshold for reference, so that the authenticationsystem has the features of redundancy and fault tolerance and moreover the formal verification of thisprotocol proves its security in IND-ID-CPA.(2) The thesis studies the identity authentication of context dependent in the pervasive computingenvironment, integrates users’ background with their attributes in an organic way through analysis,and establishes attribute-based threshold authentication protocol with the combination ofattribute-based encryption (ABE) system through appropriate setting of access structure, on the basisof vector space threshold project. The protocol still has the feature of distributed operation, and itsauthentication procedures are completed by various authentication junctions, keeping its advantagesof small operation and traffic and also the identity authentication completed by the protocol based onusers’ attribute is very suitable for the pervasive computing environment.(3) The thesis analyzes the anonymous authentication technology in the pervasive computing environment. Anonymity of anonymous authentication is divided into two levels: the one isanonymous protection for the identity of the authenticated party, namely, having trust to theauthenticated party in a way which will not expose its complete identity and thus the attribute-basedauthentication protocol will possess such anonymity; the other one is anonymous protection for partattributes of attribute authentication, which is actually anonymous protection for group and for suchapplication, this paper is intended to construct this group anonymity with the combination ofconstruction method of Lagrange interpolation polynomial threshold on the basis of standard ABE andto carry out mathematical derivation and demonstration for its correctness and anonymity, whichfinally is analyzed and verified by the experiment.(4) The construction of two-way authentication protocol of signcryption-based distributedthreshold is completed. Entry parameter consists of the public key and private key in the constructionof signcryption operation-the core of signcryption; therefore similar effects as signature andencryption can be together completed in an operation. Two-way signcryption-based authenticationprotocol is completed in the (Zheng) signcryption and ABE system in this paper and it is verified bythe experiment that the price for implementing this two-way protocol is similar to that of one-wayauthentication protocol. Also this protocol of distributed operation and threshold characteristics isvery suitable for the pervasive computing environment.
Keywords/Search Tags:pervasive computing, authentication, IBE, ABE, vector space, threshold, signcryption, mutual authentication, anonymous authentication, group anthentication
PDF Full Text Request
Related items