Font Size: a A A

Research On Universal Authentication Protocol For IoT End-devices Without Identity Assisted By Edge Layer

Posted on:2020-10-02Degree:MasterType:Thesis
Country:ChinaCandidate:C L ZhuFull Text:PDF
GTID:2428330590495807Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The Internet of Things has become the largest computing platform,constantly deepening our study,life and work.But the development of the Internet of Things has also brought many problems,such as the logical architecture and security problems.The traditional architecture of the Internet of Things is based on the Cloud Computing model,where the Internet of Things has the incomparable advantage of computing,resource storage,massive data processing,and valuable data extracting.However,there exist security problems in traditional Internet of Things,which leads to the privacy leakage of users and IoT devices.Hence,there is a need for new architectures and security technologies to solve the problems brought by the development of the Internet of Thing,in order to protect the privacy of users and devices.In the IoT systems,preserving privacy is an important issue,but privacy and security are contradictory.Higher privacy demands usually tend to require weaker identity,or even tend to require end-devices without identity in some applications which have higher privacy-preserving requirements.Nevertheless,authentication protocols in the cryptology often require a strong identity(that is,the end-device has its unique identity)and tend to perform complex calculations.This thesis focuses on authentication protocol for IoT end devices without identity,the specific research works are as follows:(1)In this thesis,we propose a universal authentication protocol for IoT end-devices without identity assisted by Edge Layer,which provides a lightweight authentication protocol for devices with high privacy requirements and weak computing capabilities.The protocol is based on the IoT architecture of edge computing and introduces edge-device to help end-device to complete authentication.In the process of authentication without identity,the end-devices adopt the one-way hash chain scheme,which can effectively complete the authentication and privacy-preserving.(2)In this thesis,we test the performance of the authentication protocol for IoT end-devices without identity on the platform of Intel Edison and MacBook Pro,embedded specific algorithms in each stage of the protocol,and analyzes the protocol performances based on different algorithms.(3)In this thesis,we develope a room temperature control system based on the authentication protocol for IoT end-devices without identity,and verifies the feasibility and security of the system.
Keywords/Search Tags:Internet of Things, Privacy-Preserving, Authentication without Identity, Edge computing, One-way Hash Chain
PDF Full Text Request
Related items