Font Size: a A A

Authentication Of Internet Of Things Terminal

Posted on:2014-08-21Degree:MasterType:Thesis
Country:ChinaCandidate:J L LiuFull Text:PDF
GTID:2268330401962262Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The recent coming year, the Internet of Things has become one of the mostpopular research directions in the field of communications, known as the third waveof development of information industry following the computer, the Internet world.Things technology is widely used in military, agriculture, industry, tele-medicine,environmental monitoring, disaster prevention and relief, security, smart home,intelligent transportation and other fields. With the continuous expansion of theInternet of Things applications, the number of terminals for access to the Internet ofThings has grown exponentially, and diverse community. These different types, alarge number of Internet of Things make the network more diverse, our daily lifemore comfortable at the same time, it also brings a series of safety problems.Unauthenticated terminal access Internet of Things, the network will bring a hugesecurity risk, low, so most of the Internet of Things terminal smart, certifiedtechnology is widely used on the Internet can not be directly used to authenticateInternet of Things, as a matter networking security is the first barrier terminalauthentication is urgently needed to resolve the problem.This paper first analyzes of things framework, and the characteristics of theInternet of Things, a different degree of intelligence for the Internet of Things.Design things based the terminal authentication scheme based trust authenticationscheme. Terminal authentication scheme based on Internet of Things using asymmetric key encryption system, the complexity of symmetric key algorithm islower than the public key algorithm, ECC Diffie-Hellman method for keydistribution, but also because the traditional Diffie-Hellman algorithm Thecomplexity of the equipment performance requirements. The program uses the trustdiffusion mechanism to reduce the number of keys stored by the node and thenumber of certified. Terminal authentication scheme based on trust is very lowIntelligent Internet of Things, such terminal due to the simple structure can not runcomplex encryption algorithm is to verify the correctness of the program to changethe trust according to the behavior of the terminal to terminal authentication.
Keywords/Search Tags:Internet of things, terminal, encryption algorithm, trust
PDF Full Text Request
Related items