Font Size: a A A

Research On Security Authentication Technology For The Product Authorization Chain

Posted on:2020-10-19Degree:MasterType:Thesis
Country:ChinaCandidate:Q ZhangFull Text:PDF
GTID:2428330575963558Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of the globalization economic integration in Internet of things,large-scale intelligent terminals accessing to the wireless network has brought a series of security threats.In order to guarantee users query and authorization of the product information in the system,it is very crucial to protect the wireless two-way authentication between user intelligent terminals and servers in the product authorization chain.In order to ensure legitimate users connect to the wireless network correctly,the main work of this paper are as follows:(1)The product authorization chain model is constructed,its authorization process is analyzed,and its security problems and the necessity of solving problems are pointed out.According to the system requirements of this paper,the evaluation criteria of the security of the authentication scheme is proposed.Kaul-Awasthi's scheme is analyzed,and it is found that it has the security defect,which cannot resist offline password guessing attack.(2)An improved lightweight user authentication protocol was proposed.BAN logic analysis proves that the proposed protocol is secure.The security analysis shows that the proposed protocol has higher security.In order to solve the limitation that the system clock must strictly synchronous,further optimizing the proposed scheme and applying it to the product authorization chain,a wireless two-way authentication and authentication scheme for the product authorization chain is proposed,which verifies the freshness of the message by continuously updating the packet serial number instead of time stamp to avoid the strict time synchronization between intelligent terminals and servers.After completing the two-way authorization,the user information query and authorization are realized.(3)By the analysis of BAN logic,security,cost and time complexity,the proposed scheme ensures higher security with lower cost and less computational complexity.The detection results of the OFMC and CL-AtSe back-end in AVISPA show that the proposed scheme can resist common attacks,further verifying its security.The simulation result of the computation cost shows that the computation time is less and the effect is better in mutual authentication phase of the proposed scheme,compared with Kaul-Awasthi's scheme.
Keywords/Search Tags:Product authorization chain, Intelligent terminals, Identity authentication, Mutual authentication, Lightweight
PDF Full Text Request
Related items