Font Size: a A A

Design And Analysis Of Cryptosystem For The Internet Of Things

Posted on:2017-03-16Degree:MasterType:Thesis
Country:ChinaCandidate:C H ZhengFull Text:PDF
GTID:2348330485484705Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The Internet of things is an important part of new generation of information technology which can connect any goods with Internet, exchange information and communication, so as to realize intelligent identification, location, tracking, monitoring and management. Wireless sensor network is an important part of Internet of things which is mainly responsible for sensing, collecting information and transmitting the collected information to the server. Then server will analyze and manage the information. Internet of things is the basic tool for the establishment of intelligent society, but it also brings a lot of technical challenges. Data security is one of the important problems. This thesis mainly focuses on how to securely send collected data from sensors to the server. If the data collected by wireless sensor networks has been increased or deleted in the process of communication, the results of data analysis is unbelievable, and may even bring serious disaster. So it is critical to establish a secure channel between wireless sensor networks and the server. On the other hand, the sensors have limited power, computing and storage resources, so it is necessary to design efficient schemes to achieve data confidentiality, integrity, authentication and non-repudiation.In order to solve the above problem, this thesis finishes the following works:(1)This thesis designs a heterogeneous ring signcryption scheme. This scheme can use a logical step to simultaneously realize data confidentiality, integrity, authentication and non-repudiation, anonymity. At the same time, it allows a sensor node in an identity-based cryptography to send a message to a server in a public key infrastructure.This scheme has the indistinguishability against adaptive chosen ciphertext attacks and existential unforgeability against adaptive chosen messages attacks in the random oracle model.(2)This thesis designs an identity-based combined public key scheme. It can realize encryption and signature only using a single public key/private key pair. For the identity-based cryptography, the combined public key scheme can greatly reduce the number of identity information and reduce the cost of public key generator generates private keys for users. This scheme has the indistinguishability against adaptive chosen ciphertext and identities attacks and existential unforgeability against adaptive chosen messages and identities attacks in the random oracle model.Then this thesis uses the combined public key scheme to design a protocol with authentication and confidentiality for the communication between the sensor nodes and the server.The two schemes in this thesis can simultaneously achieve data confidentiality, integrity, authentication, non-repudiation. At the same time, the design of the two schemes is based on the characteristic of the Internet of Things. So the two schemes are suitable for solving security problems of the Internet of Things.
Keywords/Search Tags:Internet of Things, Ring signcryption, Combined public key scheme, Random oracle model, Provable security
PDF Full Text Request
Related items