Font Size: a A A

The Research Of Authentication And Key Management In The Internet Of Things

Posted on:2014-06-28Degree:MasterType:Thesis
Country:ChinaCandidate:L ChenFull Text:PDF
GTID:2268330425972364Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Internet of things is another technology wave of global information industry after computer, Internet and mobile communication network. It brings about great opportunities and challenges to our informationalized and intelligentized life. However, the security also become more and more increasingly prominent, especially authentication and key management become one of the key issues of the Internet of things, which play the fundamental role of the entire Internet of thingsā€™s safe operation. This thesis describes the concept and architecture of the Internet of Things, and analysis its security challenges. The sensing layer of Internet of things, represented by RFID and wireless sensor networks, has a limited computing and storage capacity characteristics. The traditional network security solutions are no longer suitable the Internet of Things.In RFID network, because most of the label is a low-cost passive tags, the computing power can not meet the requirements of public key cryptography technology. The thesis proposes a lightweight symmetric encryption scheme based on Hash function to achieve the mutual authentication between card reader and tag. The analysis of the security and performance are presented. The scheme compared with others has the advantages of lower overhead of computing and storage. In wireless sensor networks, nodes are often deployed in unattended areas, which require higher security requirements. At the mean time, communication between nodes is very frequently. If we adopt a symmetric cryptosystem not only causes lack of security but also perplexes the session key consultations and costs a large amount of storage space. Scheme based on traditional public key cryptosystem require online trusted third party, while wireless sensor networks does not support infrastructure construction for reliable third-party service. However, the research findings of recent years show that the IBE scheme which does not require Certificate Authority is very suitable for wireless sensor networks. The scheme uses the unique identity information as a public key to simplify the authentication and key management process. The thesis presents an efficient IBE scheme, introduced the algorithm and put forward the security proof, and presents the application program of key distribution, anthentication, key management and update in wireless sensor networks. Compared with other existing algorithms, the new scheme possesses the advantages as the shorter system parameters, more efficiency and safety.
Keywords/Search Tags:Internet of things, wireless sensor network, authentication, key management, IBE
PDF Full Text Request
Related items