Font Size: a A A

Research On M2M Authentication Protocol Based On Dynamic Secret Technology

Posted on:2018-03-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y Z YuFull Text:PDF
GTID:2348330542960022Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of M2M technology and Internet of things technology,its application has penetrated into all areas of our lives,and it has brought great convenience to people's lives and works.All kinds of information related to us will be a lot of circulation between the M2M system.In the communication process of M2M will appear a variety of security issues in front of the sensor devices,network links and the end of the server,they can cause the user's personal information leakage,if such informations are used by criminals may also cause some serious consequences.The difficulty of the M2M communication process is the initial distribution of the device key and the update of the key in the case of unattended management.Therefore,it is urgent to solve the security problem of M2M system.In this paper,a new identity authentication scheme is proposed,which is based on the dynamic secret protocol,and uses Intel SGX technology to solve the problem of M2M system communication.Intel SGX(Software Guard Extensions)protects selected code and data from disclosure or modification,developers can partition their application into CPU-hardened "enclave" or protected areas of execution in memory that increase security even on compromised platforms.The use of Intel SGX technology ensure the security of the authenticate key and other secret informations when the client to server authentication,it also can be used for private key information management,including the establishment of key distribution,security storage,dynamic update and so on.The core design of dynamic secret protocol is proved by strict security theory,according to the common data received by the sender and the receiver,the dynamic secret is generated dynamically,and the key is dynamically encrypted.Dynamic secret protocol ensures the key used in each communication between the client and server is completely different,the validity of each communication key exists only in the authentication of this communication.Therefore,this is a very good solution to the key of traditional M2M communication without trusted third party in the case of unattended automatic update of key problem,and also has a good resistance to the key is stolen and replay attacks and other security issues.Through the using of dynamic secret protocol and Intel SGX technology,the authentication process of M2M is doubly protected,which effectively solves the problems of the key establishment,distribution,security storage,dynamic update and identity authentication in the communication process of M2M devices,and protects the security of M2M communication process.Allows users to enjoy the convenience of life and work in the M2M,greatly enhance the trust of the M2M system.
Keywords/Search Tags:Information security, Identity authentication, Trusted computing, M2M, Dynamic secret, Intel SGX
PDF Full Text Request
Related items