Font Size: a A A

Research On Unified Authentication Mechanism In The Internet Of Things

Posted on:2014-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:Q W JuFull Text:PDF
GTID:2268330425456691Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As a product of the combination of the sensor network and Internet,Internet of Things has become a hotspot of current research. Comparedwith the traditional network, application system in Internet of Things hasmore types, quantities and unsafe factors. The combination of the sensornetwork and Internet bring more convenience to people, as the same time,the characteristics of the Internet of Things bring more security problemsand manage problems.As Internet of Things developing rapidly, multi-application serviceshosted unified certification system is already one of the trends. Althoughthe unified authentication technology in network matures, but the unifiedauthentication in Internet of Things still needs to be further studied,because of there is a difference between Internet of Things and traditionalnetwork. As feathures of the Internet of Things, massive data information,easy exposure of user privacy and heterogeneity of the underlyingnetwork, etc., require higher user authentication security and unifiedauthorization manageability. In the Internet of Things, how to improveuser authentication security in unified authentication system platform,andeasier in unified license management, it is very important of in-depthanalysis of unified authentication security mechanism in Internet ofThings.This article first analyze related technologies and research status ofthe Internet of Things and unified authentication, pointed out that, theexisting unified certification system can not meet the securityrequriements of certification in Internet of Things, and there are complexissues in authroized management of unified authority. Through thesecurity requirement analysis of the application system, combined withthe related methods of access control and unified authorization, thisarticle proposed hierarchical authentication and authorization methods, inaccordance with the thought of application system integration. Thismethod is mainly divided into three parts: the hierarchical access policy, security policy and a unified user authorization policy. Based on thecurrent authentication, the hierarchical access policy increases thedynamic user authentication security, improve the security of theauthentication; using user dynamic information, user security policypropose method of user security levels calculating, dynamic reflecting theuser’s security; through permissions classification and correspondingmanagement, unified user authorization policy reducing the unifiedauthorization rights management complexity.
Keywords/Search Tags:the internet of things, user security level, application systemsecurity level, unified authorization, access control
PDF Full Text Request
Related items