Font Size: a A A

Research On Group Key Management Protocols For The Internet Of Things

Posted on:2020-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:G J WangFull Text:PDF
GTID:2428330590974193Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The industry in the IoT has a great boom,but the technology which is widely used bings many problems for us,the main problem is security,such as the user's identify information,bank card password and other privacy are stolen.Our stduy the security of group communication based on the IoT,which is achieved by group key management protocol.In the current study,the group key management protocol is divided into two categories,the ones is based on the ideal environment,and not considering the specific applying scenario,cannot suit for the IoT.And the others are base on IoT that have security problems,and overhead cannot satisfy the requirement of IoT.Based on the above problems,our topic design two group management protocols.Our topic design a group key distribution protocol when the KDC not in IoT.According to the characteristics of storage,computation,traffic and network structure in the IoT,this protocol divides group members into several subgroups,each of which is managed by a KDC.The protocol consists of three stages: group key establishment,group member leaving and group member joining.In the group key establishment stage,the KDC calculates the relevant information by the public key,and sends to the group members by broadcasting.After receiving the information,the group members decrypt the information and calculate the group key.When the group members leave or join,the key distribution center re-distributes the key to ensure the forward and backward security.And our topic also perform security analysis and BAN logic security proof,verifying the security of the protocol,and the simulation of the IoT scenario is programmed to carry out experiments,and the results are compared with the relevant research results.It is verified that the protocol can meet the requirements of the Iot environment in terms of storage,computation and energy consumption.Our topic design a group key negotiation protocol when no KDC in the IoT.This protocol is to construct group key equally by group members.According to the order,relevant information is calculated from the first member.Through the first round calculation,the last member calculates the group key,and then the last group member calculates the information in the opposite order and transmits it.By the two rounds of calculation,all the group members get group Key.And the security analysis and BAN logic proof of the protocol are carried out,which verifies the security of the protocol.It also simulates the scenario of the IoT and makes a comparison with the related protocols.It proves it can meet the requirements of the IoT.
Keywords/Search Tags:internet of things, security, group key, manage protocol
PDF Full Text Request
Related items