Font Size: a A A

Research On Devices Authentication Scheme In Smart Home Network Environment

Posted on:2021-03-29Degree:MasterType:Thesis
Country:ChinaCandidate:Q Y LiFull Text:PDF
GTID:2428330611956078Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The development and application of Internet of Things technology has strongly promoted the development of social productivity,such as the accelerated iteration of various smart devices,the development and comprehensive utilization of various smart sensors,and the continuous manufacture and update of smart home devices.However,while the above technologies and products provide convenience to people,they also bring various potential security issues,such as the increasingly prominent IoT data security,IoT device identity authentication,privacy protection in the IoT environment,and important devices Access control,etc.,the above issues have attracted many scholars to carry out research.This article absorbs and uses part of the technology and ideas of the blockchain,combined with the security of the Internet of Things,and takes smart home as the actual research environment and object to propose a Device Authentication Scheme based on Blockchain Technology(BCT-DAS),which adopts distributed storage,decentralization,anti-counterfeiting and anti-tampering technologie and avoids the problem of networkwide failure caused by a single point of server failure in the centralized mode.Random numbers and time stamps are used to ensure that the information will not be Reuse to prevent replay attacks.BCT-DAS uses SHA-256 algorithm to improve the security strength of data tamper resistance and adopts blockchain accounting technology to track the source of security after a security accident.Minewhile,BCT-DAS uses Practical Byzantine Fault Tolerance(PBFT)consensus algorithm to improve consistency Accuracy of consensus,adopts data encryption technology to ensure data content security,etc.BCT-DAS is more practical and can solve the problem of security certification of smart devices in a smart home environment,especially in the current home WIFI network with weak security protections like as weak passwords,weak router access security mechanisms,etc.Not only that,BCT-DAS can also be applied to the identity security authentication of device nodes in the Internet of Things,especially for most of the various centralized Internet of Things application systems currently used.This research has special practical value and significance.In addition,in this paper,the representative BAN logical reasoning method in the formal analysis method is used to analyze the security of BCT-DAS,and logical reasoning is proved according to axioms and rules to prove whether BCT-DAS meets its security requirements in a smart home environment.At the same time,experiments are conducted on the performance of the PBFT consensus algorithm and the time delay when there are a large number of nodes.The final demonstration and experimental results show that this authentication mechanism can resist common attack methods such as replay attacks and man-in-the-middle attacks.Compared with the same type of authentication scheme,The calculation time of the BCT-DAS scheme is slightly increased,but it has higher security.
Keywords/Search Tags:Smart home, Device Authentication, Block Chain, Hash
PDF Full Text Request
Related items