Font Size: a A A

Reseach On Lite-CA Authentication Protocol For Iot

Posted on:2015-03-18Degree:MasterType:Thesis
Country:ChinaCandidate:S M LaFull Text:PDF
GTID:2298330431498212Subject:Computer network security
Abstract/Summary:PDF Full Text Request
The internet of things is one of the most popular research direction in the field ofcommunication at present, with the application of this concept, the equipments caninteract information by themselves without anthropogenic interference, facilitatingpeople’s life greatly. However, it bring about a new security problem while thiscommunication mode without anthropogenic interference convenient for people’s life.In the IOT, the quantity of the terminal equipments will increase by geometricmagnitude. The huge amount of terminal equipments poses a tough challenge for thecapacity of the wireless communication network. And also the identity certificationamong the communication nodes become a primary problem to be solved.Firstly, this paper analyzes the development and present situation of the IOT andits security, elaborating the certification protocol framework for the IOT in detail,expounding the advantages and disadvantages of various authentication protocolframeworks, and prove the applicability of the protocol framework of thelightweight CA(Lite Certificate Authority, LCA) which is used in the IOT. Secondly,the wired network certification protocol based on the traditional certificate public keycrypto-system in the past is complicated, and it is difficult to reach desired effect inthe wireless network which is limited. In order to solve the problem with the publickey authentication framework of the lightweight CA, the paper designs two-wayauthentication among user, LCA and sensor node. Analysis shows that, LCA solvesthe complexity of public key certificate that based on the mechanism of CA, it has alot of advantages, such as the lightweight in produced public key and public keyauthentication, without the certificate management etc. The user and the sensor nodes,and the mutual authentication between the sensor nodes do without the participationof LCA, Again, the method for formal analysis based on logic of BAN protocol hasanalyzed the authentication protocol of lightweight CA that presented in this article,and also proves the protocol’s security, more over the user and sensor nodes caneventually consult session key. Finally, this paper analyzes the performance of theprotocol, and obtains its advantages in terms of storage and computing, then resist the means of attack wireless operational more easy, such as the DDoS attack etc.
Keywords/Search Tags:the Internet of things, network security, LCA, mutual authentication, BAN
PDF Full Text Request
Related items