Font Size: a A A

Research On HIBE-based The Key Timing Replacement Scheme In The Internet Of Things

Posted on:2015-06-03Degree:MasterType:Thesis
Country:ChinaCandidate:J XingFull Text:PDF
GTID:2298330431984151Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The Internet of things is following the development of computer and the Internet,becoming the world’s third wave. It is built on the Internet and based on the sensornetworks,forming a network which is things and things connected. The developmentof Internet of things has important significance for economic and society development.But in the internet of things, there are the huge number of various objects, so thesecurity and privacy of objects is of great significance for the development of theInternet of things.This paper analyzes the architecture of Internet of things and characteristics ofeach layer, and the security threats faced by each layer. Because the Internet of thingswith sensory information diversity, complex network environment, the characteristicof diversity of application requirements, so to study the safety of the Internet of thingsis very challenging. Under the conditions of the Internet of things brought by theinteraction between the heterogeneous network security issues such as data privacyand authentication, etc., puts forward the key timing replacement scheme for Internetof things. And analyze the performance of the scheme, show that this scheme cansatisfy the communication nodes in the Internet of things less storage and computingpower is poor, less resource conditions. Specific content is as follows:Firstly, Au and others Hierarchical Identity-Based cryptography was introducedand analyzed in this paper. After analyzed the Au’s HIBE scheme, We found that theforgers can be obtained the user’s private key by forging the identity. And then toconstruct a user of the binary tree structure based on the HIBE algorithms, thealgorithm is based on the root node to the user’s path generating parameters to realizeencryption. Secondly, based on HIBE key timing replacement scheme is proposed, thisscheme include key management, identity, rights management and the domainmanagement four modules, between four modules trust each other, work together tocomplete the user authentication and key send, one of the key change is triggered bythe timer.Finally, building a model in the Internet of things, which is HIBE-based the Keytiming replacement scheme.The scheme is to hierarchical network share node keyagreement, in the control center is responsible for the regional server key distribution,regional server is responsible for the users in the region’s key to send. Use this keymanagement scheme for the Internet of things communication, can solve the problemsthat the Internet of things key management scheme deployment node and in the keyshared stage excessive resource consumption, and the node lack the necessary securitymechanism lead to problems such as weak ability to resist attacks.
Keywords/Search Tags:The Internet of things, Key management, HierarchicalIdentity-Based cryptography, Security issues
PDF Full Text Request
Related items