Font Size: a A A

Design Of The Authentication And Key Management In The Internet Of Things

Posted on:2013-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:X LongFull Text:PDF
GTID:2218330362959198Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of the Internet of Things (IoT), the security has gotten more attention. Concern the telemedicine applications and wireless sensor network which is part of the IoT, in this paper, describes the course of the security development, image processing, and quantitative techniques. And this paper analyzes the applicability of different technologies in the IoT.In the study of the authentication, this thesis analyzes the advantage and defect of the sinusoidal projection and feature extraction of the authenticate schemes. And combine the advantages of the two schemes, design a variable algorithm of authenticate scheme. It uses the quantification to simplify the input, and add the physical layer parameters to the authenticate elements. The scheme improves the security, reduce the time cost. Meanwhile uses the more ROM to replace the less RAM.In the study of the key management, this thesis analyzes the advantage and defect of the time function and elliptical projection of the key management. And combine the advantages of the two schemes, design high security scheme of the key management. It achieves the self‐update, parameter update, and key update. These modules constitute the direct key update course and indirect update course. And on this basis, this thesis uses the physical later parameters to replace the time function which has a high cost, so further reduce the time consumption of key management.At last, this thesis implements the simulation and verification of a variable algorithm of authenticate scheme and a high security scheme of the key management in the MICAz notes, and analysis the applicability of the schemes in the large‐scale notes situation.
Keywords/Search Tags:Internet of Things, wireless sensor network, authentication, key management, elliptic curve
PDF Full Text Request
Related items