Font Size: a A A

Research On Security Authentication Mechanism Based On Elliptic Curve Under The Internet Of Things Environment

Posted on:2015-03-15Degree:MasterType:Thesis
Country:ChinaCandidate:K YangFull Text:PDF
GTID:2348330485494391Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of the Internet of Things(IOT) and its wide use in every aspects of life, the risks of security have drawn more and more people's attention in addition to the convenience. As the authentication and communication processed between two machines rather than people and machine, it, therefore, necessitates higher requirement of the security of information. What gradually concerns us in the field of IOT is the maintenance of confidentiality, integrity and non-repudiation in the transmission of information, which has also been an important research topic.Intelligent Transportation is an important manifestation and application of IOT.Because of the limited computing power of the equipment of Intelligent Transportation, many of the existed encryption algorithms are difficult to be carried out in such an environment. Up to date, a mature and viable security protocol of the intelligent transportation system is still waiting to be recognized. It is, therefore,meaningful to design a safe, effective and specific authentication protocol for POS device in intelligent transportation.After analyzing various existed networking security protocols, a comprehensive study of Elliptic Curve Digital Signature Algorithm(ECDSA) has been conducted.Under the condition of limited memory capacity and computing power in LOT, a new program is proposed for identity authentication using ECDSA in this thesis. As the device is vulnerable to be attacked and the consequent leakage of the key, the program based on ECDSA has the property of forward secrecy in order to avoid the safety influence of the leakage of key. The new program are more secure and effective. At last, simulations using Visual C ++ database and OPENSSL library have been performed to prove the feasibility and effectiveness of the program.
Keywords/Search Tags:Internet of Things, elliptic curve, digital signature, forward secure, OPENSSL
PDF Full Text Request
Related items