Font Size: a A A

Research On Key Technologies Of Wearable Computing Security

Posted on:2020-01-03Degree:DoctorType:Dissertation
Country:ChinaCandidate:M S CaoFull Text:PDF
GTID:1368330596975719Subject:Information security
Abstract/Summary:PDF Full Text Request
Wearable devices such as smart bracelets,smart watches,3D glasses have become a part of people's work and life while the sensor and battery technology evolve.Wearable devices play an important role in the field of health care such as entertainment,clinic and health care,sports and military fields.Wearable devices collect data from human body and then transmit data to remote cloud servers.Remote users can monitor the data of wearable devices in real time.Therefore,wearable computing has become a platform for data interaction inside and outside the human body.As wearable computing contains a large number of secret and privacy data,how to ensure the security of wearable computing has become a bottleneck restricting the development of this field.This thesis will focus on the key technologies of wearable computing security,such as device authentication,shared key,secure transmission and data access,to provide the necessary guarantee for data security in wearable computing and wireless body area network.In the aspect of equipment authentication,this thesis proposes a device authentication protocol based on radio frequency fingerprint using audio hardware loudspeaker,and microphone.The sender sends the specified audio by the loudspeaker,and the receiver extracts the fingerprint features of the received audio by the microphone.In order to improve the accuracy of authentication,this thesis proposes a tubular audio fingerprint matching algorithm.In order to further verify the feasibility of the model,this thesis designs an application based on Android system,and a lot of experiments are carried out in real scenes.The experimental results show that the application range of this scheme can reach more than 20 m,and the average accuracy of authentication can reach more than 99%.Compared with traditional cryptography,this authentication scheme has better security,universality and robustness.In the aspect of secure communication,the proposed scheme includes shared key,near-field authentication and secure transmission protocol design.Shared key: in this thesis,the accelerometer of the equipment to be communicated is used to collect data,and then series operations which include pretreatment,feature extraction,bit quantization,error correction and privacy amplification are operated on the collected data.Finally,the two sides of the communication generate the same shared secret key.In the pretreatment process,the vector length of the collected three-dimensional data is used as the data feature.In order to improve the randomness of the shared key,this thesis proposes an extremum extraction and data filtering algorithm;in order to improve the consistency of the key,this thesis proposes a matching algorithm based on adjacent points.The experimental results show that most of the bit keys are more than 90% consistent.In order to generate the same key,the system uses BCH for error correction and reconciliation.In order to improve the security of key,the system adopts privacy amplification mechanism.Finally,this thesis tests the randomness of the key,and the test results show that the key passes the NIST randomness test.Therefore,the lightweight shared key protocol proposed in this thesis can be used for secure communication in WBAN.Near-field authentication:a near-field authentication scheme is proposed by using audio hardware loudspeakers and microphones.Considering that all kinds of sensor devices and gateway nodes in the WBAN are near-field communication,this thesis designs an distance measurement scheme based on audio by using the characteristics of sound propagation.Double-channel monitoring of audio and the correlation calculation of recording files are used to obtain the time delay.Then the distance between the two sides of communication can be computed by the time delay.A lightweight distance verification scheme is proposed.Compared with time recording,the accuracy of audio ranging is higher and there is no need of time synchronization between the two sides of communication.On the basis of shared key and audio ranging,this thesis designs a multi-channel data transmission protocol to realize the confidentiality,integrity and authenticity of messages.In terms of data access: the collected data from WBAN is often stored in cloud servers while data owners can not manage and control the data all the time.How to ensure the security and control of the remote server data is a problem.First of all,to ensure the security of data,the data should be encrypted and stored on cloud servers.In addition,data access by users with different permissions needs to be considered.Therefore,in order to meet the needs of cloud server-assisted retrieval and data sharing,this thesis designs a lightweight keyword retrieval and data access mechanism based on Attribute-Based ciphertext data.Flexible and fine-grained access control is implemented for multi-user scenarios,with lightweight advantages,and end users do not need too much computation and storage resources.Finally,the function,storage cost and computation cost of the scheme are compared with other schemes,which further proves that the scheme can be applied to data sharing in WBAN.With the development of 5G,AI,IOT and other technologies,wearable computing devices will have a broader application prospect.Although this thesis has carried out some research on the data security of WBAN,more attention should be paid to the data security and user privacy of wearable computing.
Keywords/Search Tags:Wearable Devices, Wireless Body Area Network (WBAN), Identity Authentication, Shared Key, Attribute-Based Encryption
PDF Full Text Request
Related items