Font Size: a A A

Study On The Method For Comprehensive Device Authentication In Digital Home

Posted on:2015-12-17Degree:MasterType:Thesis
Country:ChinaCandidate:R K WangFull Text:PDF
GTID:2308330464464611Subject:Computer technology
Abstract/Summary:PDF Full Text Request
It’s basic requirement to build digital home that home devices that have different communication standard can be safety interconnection and ensuring the authenticity and legality of devices. Being lack of effective access authentication and integrity verification method with heterogeneous devices are the main factors affecting the data security and device safety in digital home. Due to the credibility of devices can not be guaranteed in the communication and access process, the traditional method of user authentication leads to illegal access of home devices, leak of user and other security issues.For the problem of being lack of effective integrated access authentication method for heterogeneous devices in digital home, based on the idea of trusted computing, this paper propose a trusted device authentication mechanism access to digital home based on TPM.This device access process can be divided into three phases:registration, access and update. Device registration in joint equipment manufacturers to complete the verification of the authenticity and legality of the device, and verification of devices can be finished by comparing the integrity of the metric achieve integrity of devices when they are accessing to home network. Instant update of devices will be complete when the metric information of device is updated, and it can ensure continued access of the device. On these basis, this paper design a related trusted access protocol for home devices, and a detailed description of the access authentication procedure is proposed.To sovle the problem of being lack of an effective device authentication method in digital home, a PKI-based device authentication methods is proposed in this paper. This paper also designs a detailed authentication protocols. By using device certificates issued in the device registration phase to ensure the uniqueness and authenticity verification of the device. Besides, the protocol uses a mechanism of key agreement based on ECDH. ECDH has lots of advantages such as high intensity, short keys, fast calculation, so it can reduce the performance requirements for the device, and it can enhance the universality of the method, improves the security of the authentication process. While the verification of the message sender’s identity can be resolved by using the signature of device certificate, the problem of ECDH key exchange protocolsunder middleman attacks can be solvedBased on these studies, this paper design an integrated authentication platform for devices in digital home and trusted access authentication protocol and device authentication protocols are described in detail.
Keywords/Search Tags:Digital Home, Device Authentication, Access Authentication, TPM, PKI
PDF Full Text Request
Related items