Font Size: a A A

Research And Design Of Smart Home Security Protocol Based On ECC And Embedded Technology

Posted on:2018-07-03Degree:MasterType:Thesis
Country:ChinaCandidate:J LiuFull Text:PDF
GTID:2322330512984837Subject:Engineering
Abstract/Summary:PDF Full Text Request
Smart home has originated in 1980s, but the rise of smart home is actually after the Internet of things technology has become mature. The maturity of the wireless communication technology in the Internet of Things technology allows the smart home system could remove the wiring part, which makes the cost of installing the smart home system in the home dropped greatly, paving the way for the promotion of the intelligent home. Wireless communication technology reduces the complexity of the device of smart home, at the same time, there are some disadvantages such as the communication channel is open, and communication information is easily accessible by rivals. Smart home provides people the comfortable life, at the same time, security issues have become increasingly prominent, which becomes a stumbling block for the popularity of smart home. A lot of reports on the privacy leaks of smart home also let the general public questioned the safety of smart home.Considering the openness of wireless communication signals, this paper proposes an encryption algorithm based on elliptic curve cryptography to ensure the confidentiality of information, and uses elliptic curve based on the digital signature technology to ensure the non-repudiation of communication information. Wireless communication information encryption and the digital signature of the information require private keys. So the private key is very important, can not be leaked to the adversary. Therefore, this paper designs a key management mechanism to ensure the security of the key. The main contents of this paper are as follows:(1) The household appliance in the home can be converted into a smart home appliance by embedding a home appliance control node. Each control node installs the CC1101 wireless communication module, and the working frequency of the module is 433MHz. The penetration of this frequency signal is strong, so this frequency signal is suitable for smart home. Intelligent home's center control node is the smart gateway,which also installed CC1101 wireless communication module. After the authentication of each node, a wireless communication network whose topology is a tree, based on intelligent gateway is established. The intelligent gateway is the root node of the tree network.(2) In this paper, an encryption algorithm based on elliptic curve cryptography is used to encrypt the communication information to ensure the confidentiality of wireless communication within the home. The elliptic curve discrete logarithm problem is the mathematical basis of elliptic curve cryptography, which guarantees the security of the algorithm.(3) This paper uses a digital signature scheme based on elliptic curve cryptography and China national standard SM3 cryptography hash algorithm. Digital signature is the sender of the information attaching his or her exclusive identity to the information he sends to prevent the sender from rejecting the information he has sent. At the same time,it also ensures that the adversary can not falsify his own information to the information of a legitimate node in the wireless network.(4) Based on the unique ID number of each STM32 chip, a hardware level security key management mechanism is designed, which guarantees the security of key storage in the generation, distribution and update of the key. At the same time, the key management protocol designed in this paper takes into account the security of the key from the generation, distribution, update and storage of the key, to ensure the safety of storage in the node keys and the security of the transmission in the wireless network.The chip ID is also part of the identity code of each node, making the identification code of the node unique in the world, providing security for nodes' joining network and the identity of the communication.(5) Finally, this paper analyzes the security of the security protocol in this paper by using the random oracle model, which is one method of the provable security method.The random oracle model uses a tool named reduction. This tool is used to reduce the security problem of the security protocol to the difficulty of the elliptic curve discrete logarithm, and the difficulty of this problem is widely recognized, therefore the security protocol designed in this paper is safe.
Keywords/Search Tags:Internet of things, Elliptic curve cryptography, Hash function, Key management, Random oracle model
PDF Full Text Request
Related items