Font Size: a A A

Research On Key Management And Authentication Protocol In The Internet Of Things

Posted on:2014-10-22Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2268330401952862Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Internet of Things Technologies become important reality promotion for economic development and society progress. This thesis focus on its security network architecture and security features, in which security attack in each layer is analysised. According to connection of heterogeneous network in IoTs which bring data privacy and security authentication problems,A key management scheme and A authentication signature protocol are proposed, analysis of performance and security shows, they can provide security requirement under low communication, computation and resource consumption. The main content of thesis are below:Firstly, A key management scheme based on ECC is proposed, which adopt Hamilton algorithm to construct key pool. ElGamal cryptosystem is introduced to design session key agreement protocol in this scheme, which could effectively reduce the computation and resource cost of node. This scheme has good connectivity and expandability.Secondly, A light weight authentication key agreement protocol based on ECC is presented. Compared with ECMQV,WANG and ECDH protocol, it can provide greater security with less key. This protocol is proved security in ID-BJM model, which can provide forward/back secrecy and PKG forward secrecy.And then, A key management scheme based on HECRT is proposed, in which a layer network model based on node location is given. Double key pools is introduced to save network overhead and node resource consumption. Homomorphic encryption technology is adopted for privacy protection, A security network model and pair-key discover probability simulation is given, which shows this scheme have good connectivity and security.Lastly, A partially blind signature protocol based on the Elliptic curve DLP problem is proposed, which resolve illegality signature in the signature system. HES is introduced to blind signature, a shared message of signer and user is adopted to protect illegality signature. This scheme satisfied unforgeability and non-repudiation.
Keywords/Search Tags:Internet of Things, Authentication Protocol, Key Management, Digital Signature, Elliptic curve cryptography
PDF Full Text Request
Related items