Font Size: a A A

Security Research On Authentication Technology For Internet Of Things

Posted on:2012-03-09Degree:MasterType:Thesis
Country:ChinaCandidate:W J JiaoFull Text:PDF
GTID:2178330335960161Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Internet of things(IoT) is one of the most popular research direction in telecommunications area, the main concept of which is that the communication connect can be directly established between machine and machine without human's interaction. It will bring great convenience for human's life. While this communication stype bring benefit for people's life it also introduces new security issues. With the IoT developping, the number of terminal equipments will be growth explosively, and the carrier ability of mobile telecommunication network which is used for IoT communication will be fased a severe test as it will have to deal with the huge numbers of teminals' communication. As the terminal equipments is unattended by people, their own phiscal and logical security cannot be guaranteed. With perceived function of senor network the IoT can conveniencely provide information for legal user but it will be easily obtained by others if it is not enough security protection. Even a malicious attacker may obtain the user's privacy though the application use case or the location of the machine or others. Therefore, it is necessary to strengthen the security protection for IoT. Only if there is a strong security system to ensure the safety and reliability of IoT will it promote the healthy development of IoT.At first this paper gives a brief introduction on the emergence and research status for IoT security, as well as the description on the IoT architecture which based on the mobile telecommunication networks. Based the description of IoT architecture, the papar summes up the characteristics of IoT which is different from current mobile communication networks. Then the papar gives detail analysis for security threats about terminal devices of IoT, sensor network, mobile communication network, applications of IoT as well as managements. Based on the detail security threats analysis for IoT, the papar gives security requiements for IoT. Combining with the existing security techonologys for mobile communications networks and characters for IoT architecture, the papar researches about some key security technologies such as access authentication, service authentication, encryption style, key management, privacy protection, and other security technologyies. Finally, the papar researches and proposed group based authentication mechanisms and device authentication mechanisms, as well as key derivation mechanism based authentication which are suitable for IoT. The group based authentication mechanisms can solve the issues that signalling congestion and resources waste resulted from many machines access to the network in the same time. And the device authentication can protect malicious devices from accessing to the network and performing some attacks to network and other users.
Keywords/Search Tags:Internet of Things, Security threats, Security architecture, Group based authentication, Device authentication
PDF Full Text Request
Related items