Font Size: a A A

Lightweight D2D Security Protocol Design In The IoT Environment

Posted on:2022-06-14Degree:MasterType:Thesis
Country:ChinaCandidate:L H WangFull Text:PDF
GTID:2518306524480684Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of mobile and Internet of Things(Io Ts)technologies in recent years,device-to-device(D2D)communication has been widely used.The IEEE802 standard provides many protocols for D2 D communication,such as Wi-Fi,LTE and Bluetooth.Although D2 D communication is common and convenient,in fact,the existing short-distance non-contact communication methods have many shortcomings in terms of security and flexibility.For example,Bluetooth transmission technology and NFC technology require corresponding hardware support.In addition,the Bluetooth transmission technology needs to establish a good link in advance during communication,which reduces the communication efficiency.And because of the use of open communication channels,it faces attacks such as eavesdropping,imposter attacks,and man-in-the-middle attacks.Under insecure communication channels,private data such as personal identification information,health status,and exercise trajectory can be easily leaked.Therefore,when the sent information includes personal private or sensitive data,it is necessary to implement a secure device-to-device communication method.Compared to other communication technologies,acoustic wireless communication technology has the advantages of low cost,good security and no need for specific hardware support.At the same time,due to the directional propagation characteristics and fast attenuation characteristics of sound waves,it is not easy to be eavesdropped,so sound waves can be used for safe data transmission.Based on this,this thesis intends to propose a lightweight audio-based D2 D secure communication protocol,including a device authentication protocol and a key agreement protocol.The main work of this thesis is shown as follows:1)A two-way device authentication protocol based on physical audio fingerprint was proposed.In this protocol,the ID information of the device is encoded into the audio signal,and the unclonability of the frequency response of the speaker and microphone of the mobile devices is used as the physical fingerprint of the mobile devices.The experimental results showed that the device authentication protocol proposed in this thesis has achieved a success rate of more than 90% within a distance of 50 cm and a success rate of more than 95% within 10 cm.2)A key agreement protocol based on audio coding was proposed,in which the sender encods the key into the audio signal by superimposing a specific sinusoidal signal.And the receiver sends an interference signal while receiving the audio signal to prevent a third party from obtaining the key.The experimental results showed that the key agreement protocol proposed in this thesis can achieve an accuracy of more than 92%within a distance of 10 cm.3)The main parts of the device authentication protocol and key agreement protocol proposed in this article were implemented in Android for subsequent experimental analysis.The experimental results showed that the device authentication protocol and key agreement protocol in this thesis have reached a high accuracy rate within a certain distance.
Keywords/Search Tags:D2D Communication, Device Authentication, Key Agreement, Secure Communication
PDF Full Text Request
Related items