Font Size: a A A

Research And Implementation Of A Lightweight Secure Identity-trustworthy Mechanism In Internet Of Things

Posted on:2017-05-27Degree:MasterType:Thesis
Country:ChinaCandidate:K L PengFull Text:PDF
GTID:2428330569498944Subject:Software engineering
Abstract/Summary:PDF Full Text Request
We focus on the identity-trustworthy mechanism of the Internet of Things integrated by Wireless Sensor Network and the Internet.Identity-trustworthy mechanism is the prerequisite for secure communication and can effectively prevent the man-in-the-middle attack.However,owing to the low power supply capability and low computing performance as well as low storage performance of the sensor nodes,digital certificates which are used in traditional networks are not applicable for Internet of Things.We use the Identity-based Cryptography to achieve the goal of identity-trustworthy in Internet of Things,and then point out that there are still two problems to be solved.We carefully analyse these problems and design an overall framework.The scheme is easy to implement based on the existing architecture,with strong compatibility and feasibility.In this framework,we also propose an identity-based key negotiation algorithm which has the mutual authentication capability.Then we compare our algorithm with other five classical algorithms from the aspects of security strength and computational complexity,and demonstrate that our scheme has the advantage of strong security strength and low computational complexity.Then we design a mutual authentication protocol used in the subscribe-publish architecture of Internet of Things based on the proposed algorithm.We prove that the terminal objects could complete the indirect mutual authentication by the transitivity of identity trust in the trust chain.Compared with the scheme of the end-to-end direct authentication of the communication parties in different trust domains,our protocol could significantly reduce the computational burden and communication bandwith between terminal nodes.Finally,we use the functional testing and performance testing to prove the correctness and the advantage of the proposed lightweight scheme.
Keywords/Search Tags:Internet of Things, Identity Authentication, Subscribe-Publish, Identity-based Cryptography, Protocol
PDF Full Text Request
Related items