Font Size: a A A

The Study Of The Internet Of Things Perception Layer Security Protocol Based On Symmetric Polynomials

Posted on:2014-02-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y HuangFull Text:PDF
GTID:2268330401962204Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In the three-tier architecture of the Internet of Things, the perception layer is themost important information sensory organs at the bottom layer. As the most importantsupport for the perception layer, radio frequency identification technology andwireless sensor network technology play important roles in the Internet of Thingsapplications.The radio frequency identification technology mainly deal with items identifiedin the Internet of Things, security authentication protocol between the reader andsmart label has always been the focus of security research. The main function of thewireless sensor network technology is to collect environmental data through thelarge-scale deployment of sensor nodes, the security technology research is mainly insoftware key management technology. Similarities between them, the same as thesimilarities in perception layer’s physical device of The Internet of Things, arelow-cost equipment, computing power, storage capacity, and power supply have beengreatly restricted, and they can be abstract as many-to-many wireless communicationenvironment.Due to radio frequency identification systems and wireless sensor networksystem security protocols in common, through perception layer security needs andsimilar agreements on the Internet of Things, In this paper, the radio frequencyidentification security authentication protocol and wireless sensor networks keymanagement protocol based on the symmetric polynomials has been put forward.Through changing part of the symmetric polynomial method mode, the radiofrequency identification authentication protocol based on symmetric polynomialmethod turn the symmetry operations to non-symmetrical between bothcommunication side, and making the symmetric polynomial method can be used inthe application of radio frequency identification system. In this paper, through itssecurity analysis, proved that this Agreement has a good two-way authentication,untraceable, confidentiality, forward security and synchronization security, at the same time compared with other protocols in terms of computation and authenticateprotocol scalability.The wireless sensor networks key management protocol based on symmetricpolynomial method is modified on the basis of the original agreement, and doing anincrease in key update part, makes the duality key between a pair of nodes in thenetwork can be dynamically update. The paper analysis the security and energyconsumption and scalability, and do the corresponding experimental.
Keywords/Search Tags:the Internet of Things, Perception layer, Security protocol, Radio frequencyidentification system, Wireless sensor network
PDF Full Text Request
Related items