Font Size: a A A

The Design And Implementation Of Security Authentication Technology In The Internet Of Things

Posted on:2015-09-09Degree:MasterType:Thesis
Country:ChinaCandidate:Z P WuFull Text:PDF
GTID:2308330473952910Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The internet of things is a kind of information technology, which is based on the internetwork and extends to the communication between one thing and another. With the use of it, information can be exchanged directly between equipment without the participation of man. The development and wide application of the internet of things make people’s life more convenient. However, this technology, which does not need the participation of man, brings new hidden danger for safety. At networking, the number of terminal equipment is increasing incessantly, which brings pressure and test to wireless communication network. When great deal of equipment access network simultaneously or in a very short time, adopting one-to-one authentication mechanism not only results in network congestion but also takes up a lot of network resources, bringing severe test for carrying capacity of network.This thesis, based on the research of security system structure and traits of the internet of things, realizes the certification system of a group, mainly solving the consumption and congestion of network resources caused when a great deal of terminal equipment access network simultaneously and realizing safer and more effective authentication in the context of the internet of things. This thesis, on the basis of the existing AKA authentication mechanism in 3GPP network, designed and these accomplished the security authentication of the terminal equipment with the property of the group before they access the network. The whole system designed two subsystems, service terminal subsystem and client terminal subsystem, respectively operating and finishing their own main tasks. This system realized the bidirectional authentication between the gateway and authentication server. In this system, the first terminal within the group needs two-way authentication through the gateway and authentication server, and other terminals within the group only need two-way authentication through the gateway. By carrying out the demand analysis of the Eriksson-Penker business expansion model method and the business analysis of the basic frame and each subsystem and the summary design of the Enterprise Architect tools, I designed the overall structure diagram of authentication system of the group and the system package diagram and class diagram of each subsystem. This system chooses Visual Studio 2010 SP1 as its software development environment, sets up the connection of communication through the Socket communication and uses C++.NET to realize the transfer and access of Auth library files(authlibeay32.dll) and the package of authentication interface. By writing procedure for modal test, a simple testing environment is constructed to test and verify Socket communication, client subsystem and service subsystem.This thesis, base on the deep understanding of the system architecture and security characteristics of the internet of things and security system architecture, comprehensively analyses and summaries the problems existed in the present security authentication technology, proposes the solution scheme for group authentication and realizes it. This system basically realizes the security authentication when a great deal of terminal equipment with the property of group access network simultaneously and is believed to be very useful in the research and application of security authentication of the internet of things.
Keywords/Search Tags:the internet of things, AKA authentication protocol, group authoer, signaling congestion
PDF Full Text Request
Related items