Font Size: a A A

A Secure Communication Scheme Based On Multipath Transportation For The Internet Of Things

Posted on:2014-09-19Degree:MasterType:Thesis
Country:ChinaCandidate:W J XieFull Text:PDF
GTID:2268330401958858Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
As a new technology wave of the information industry after computer, Internet andmobile communication networks, Internet of Things (IoT) has brought great opportunities tothe informationization life. However, with the development of IoT, many problems need to besolved urgently are emerging out. Particularly, security is a key factor affecting thewidespread application of IoT. Due to the unique characteristics in IoT, such as heterogeneousand processing capacity limited terminals, complex information transmission process anddiverse applications, communication security is much more complicated compared with theInternet. Moreover, the existing single-path transportation security methods cannot ensuresafety and reduce computation complexity at the same time, which makes these methods notsuitable for the IoT.In view of the above issues, this thesis proposes an end-to-end secure communicationmethod for the IoT, combining encryption and authentication technology with multipathtransportation. This method consists of three parts: two-way identity authentication, multipathkey agreement and data encryption. Firstly, both terminals of communication verify eachother’s identity, using the authentication scheme based on public key mechanism. Secondly,both terminals carry on key agreement scheme based on the Diffie-Hellman algorithm. Finally,the sender uses the session key obtained in the above stage and the symmetric encryptionalgorithm to encrypt data and split the encrypted data into segments, which are then sent tothe receiver through multiple independent paths. A secure communication system based onthis method has been implemented and verified. Theoretical analysis shows that this methodcan be better against security threats such as man-in-the-middle attack, key crack, withreduced computing complexity to a certain extent compared with the single-pathtransportation secure method.
Keywords/Search Tags:Internet of Things, multipath transportation, secure communication, Diffie-Hellman algorithm, key agreement
PDF Full Text Request
Related items