Font Size: a A A

Research On Lightweight Security Protocols And Key Techniques For Internet Of Things

Posted on:2020-01-06Degree:DoctorType:Dissertation
Country:ChinaCandidate:H G LuoFull Text:PDF
GTID:1368330596475759Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Internet of Things(IoT)is an integration of Radio Frequency Identification,sensor,Global Positioning System and other information sensing equipment used to connect anything with the Internet and have information interaction to achieve intelligent identification,perception,positioning and monitoring according to the protocols.The Internet of things highly integrates information space and physical space,and provides efficient information interaction between objects through application of perception and identification technology,network and communication technology,computing and service technology,and management and supporting technologies.However,oceans of the Internet of things data transmitted by wireless communication is vulnerable to eavesdropping,interference and other attacks,which brings great threats and challenges to information security.The processing capacity and energy of the sensing devices and hardware of the Internet of things is very limited,and the traditional complex security protocols cannot be directly applied to them.Exploring lightweight security protocols and technologies for resource-constrained systems has become a hot field in the research of information security technology of Internet of things.In recent years,researchers have proposed a series of lightweight security protocols for the protection of identity security authentication and data security access in resource-constrained systems such as RFID and WSN.However,these lightweight security protocols have defects of low efficiency,poor security and imperfection of function,etc.Therefore,it is of great scientific significance and engineering application value to explore and develop a new lightweight security protocol of Internet of Things with high efficiency,security and perfect function.In order to meet the requirements of the information security of resource-constrained systems such as RFID and WSN,the dissertation focuses on and has a thorough research of the security identification,security authentication and access control and secure routing of multi-hop communication,and proposes ultra-lightweight RFID security authentication protocol,Lightweight WSN secure access and control protocol and multi-hop distance protocol,and its performance is analyzed and verified.The main research work and contributions of this dissertation are as follows:1.On the basis of analyzing the characteristics and problems of ultra-lightweight RFID security authentication protocol,an ultra-lightweight security authentication protocol(Succinct and Lightweight Authentication Protocol,SLAP)based on lightweight bit-by-bit operation is proposed.By designing a low complexity ultra-lightweight Con(7)*,*(8)conversion operation with irreversibility,sensitivity and complete confusion in the protocol,the security of identity authentication in RFID system is improved significantly.By optimizing the authentication message structure,the information flow of the protocol is reduced effectively,and the authentication efficiency of passive RFID system is improved.The security analysis of the protocol and the functional comparison with the ultra-lightweight RFID security protocols such as LMAP,SASI,RAPP,RRAP,RCIA show that the SLAP protocol has the advantages of high security and high efficiency.2.On the basis of analyzing the characteristics and problems of lightweight WSN security access control protocol,a three factor lightweight authentication protocol and key agreement protocol based on Hash function is proposed(Three Factor Authentication Protocol,TFAP).By storing the users' password and biological secret key in the gateway in the form of hash value,along with updating them synchronously between gateway and user the protocol solves the problem that the two factor and the three-factor protocol cannot resist the attack of the clone card.The problem that the lightweight protocol based on Hash function can not guarantee the privacy of user's accessing data is solved by anonymous authentication of target sensor nodes.By simultaneously storing the previous and last successful authentication records by the gateway and the sensor node,the problem of synchronous recovery among the users,the gateway and the sensor node is solved,and the complexity of the synchronous recovery operation is reduced.It effectively improves the authentication efficiency of the protocol.Through security analysis,the performance of the lightweight WSN security access control protocol proposed by M.L.Das,Gope,A.K.Das,Jiang et al.,shows that the TFAP protocol has the advantages of high security and high efficiency.3.Aiming at the problem that the traditional one-hop DB protocol cannot prevent the distance attack in WSN multi-hop communication routing,a general model which can extend the one-hop DB protocol to the multi-hop DB protocol is proposed.The multi-hop DB protocol generated by this model has the following functions and advantages:(1)it can detect the dishonest and illegal nodes of forged communication distance in the communication route,so it can resist the HELLO flooding,wormhole and other distance attacks;(2)it can verify the legal communication distance between any two nodes in the route,and provide the verifiable communication distance information for the multi-hop communication route.In addition,the optimal formula of probability of attack success for the multi-hop DB protocol model under internal and external attacks is analyzed and derived.The simulation results verify the correctness of the above-mentioned theoretical formulas and the effective defense ability of multi-hop DB protocol against distance attack in WSN multi-hop routing.The research results of this dissertation provide a feasible solution for the security identification,security authentication and access control and the secure routing of multi-hop communication of passive RFID and WSN resource-constrained systems in the Internet of things.It is helpful to push the development of the technology of the Internet of things and its application.
Keywords/Search Tags:Internet of things, lightweight security protocol, authentication, access control, secure routing
PDF Full Text Request
Related items