Font Size: a A A

Research On Authenticated Anonymous Data Sharing Scheme In Internet Of Things

Posted on:2021-03-28Degree:MasterType:Thesis
Country:ChinaCandidate:W KongFull Text:PDF
GTID:2428330647452819Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the application and development of Internet of things(Io T)related techniques,Io T becames an indispensable part in our daily life,because of its high-quality services and convenience functions.It's worth noting that the computing resources and storages resources of Io T terminal devices are limited,and the data is vulnerable to hackers' attack and theft.As two cornerstones of protecting data security,there are still some deficiencies in the existing related research about user authentication and secure data sharing.Therefore,this paper takes user authentication and secure data sharing in Internet of things(Io T)as background,and researches the following two kinds of problems.Firstly,the existing authentication protocols based on Elliptic Curve Cryptography(ECC)cannot resist offline password guessing attack and desynchronization attack when physical devices is lost.Secondly,the problem regards to guaranteeing the integrity of data and traceability of malicious users at the same time in the data sharing in Io T.Therefore,this thesis designs the following schemes for the problems mentioned above.1)Authentication protocol for data sharing users in Io TThis paper proposes authentication scheme for data sharing users,which uses the properties of Physical Unclonable Function(PUF)and the point multiplication in the elliptic curve to protect the secret random number in the physical device from being stolen due to this device is loss.In addition,the protocol can also support offline update to resist desynchronization attack.The comparison shows that our scheme has better efficiency and satisfies more security features.2)Anonymous and traceable data sharing scheme in Io TIn order to solve the problems of guaranteeing traceability of malicious user and the difficulty of data integrity verification at the same time in the process of data sharing,this paper designs an anonymous and traceable data sharing scheme to ensure the privacy of users.This scheme applies group blind signature to ensure the traceability of malicious users or signers.In addition,the scheme achieves many security features,including authenticationability,unforgeability,anonymity,traceability.It is worth noting that security analysis and experimental simulation show the secure data sharing scheme is safe and efficient.At the same time,our scheme has high user scalability when facing large-scale users.
Keywords/Search Tags:User Authentication, Data Sharing Scheme, Anonymity and Traceability, Group Blind Signature
PDF Full Text Request
Related items