Font Size: a A A

Research On Anonymous Group Authentication Scheme In The Internet Of Things

Posted on:2022-10-11Degree:MasterType:Thesis
Country:ChinaCandidate:M FengFull Text:PDF
GTID:2518306539453024Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Recently,the Io T has developed rapidly and globally,and its applications have extended to various fields,such as smart homes,smart healthcare,farm monitoring and smart transportation.Due to the openness of the wireless communication environment,security and privacy have been key factors in the development of the Io T.The authentication scheme is the first line of defense to realize the security of the Io T.The one-to-one authentication scheme usually causes some problems that are the delay of sensor node authentication and the occupation of network resources.Instead,the group authentication scheme can improve the authentication efficiency of the gateway to the node,which is suitable for the Io T with a large number of nodes.In addition,if the node uses its real identity to communicate with the gateway,attackers are easy to obtain the node's identity by attacking the gateway.Furthermore,attackers can control the working status of the node and analyze its private data.To improve the efficiency of node authentication and protect the privacy of nodes and end users,this paper proposes two anonymous group authentication protocols for different Io T environments where the location of nodes is stable and nodes are frequently moved.(1)Anonymous group authentication protocol based on secret sharingFor Io T environment where node positions are stable and can form a stable group,such as a smart home,this paper proposes an anonymous group authentication protocol based on secret sharing technology.In this protocol,smart devices form a fixed group after the key distribution,and the gateway utilizes secret sharing and Chebyshev polynomial to quickly authenticate a group of members simultaneously.When the number of failed devices is less than or equal to the difference between the number of total devices and the threshold of the secret sharing,the gateway can still successfully authenticate normal devices in the group,which can provide fault tolerance.In addition,the anonymity of devices can prevent attackers from using the gateway to control devices or infer the user's life style,which can protect the privacy of devices and end users in smart homes.(2)Anonymous dynamic group authentication protocol based on identity-based signature(IBS)For Io T environment where node positions are real-time dynamic updated,such as the Internet of Vehicles,this paper proposes an anonymous dynamic group authentication protocol based on IBS.Due to the movement of vehicles,vehicles that send messages to the same receiver within a short period of time will form a temporary group,and the receiver utilizes IBS to perform batch authentication on the group of vehicles.In this protocol,a trusted authority generates a set of pseudonyms for the vehicle,and the vehicle will use a new pseudonym when in different groups,which realizes the anonymity of the vehicle and ensures pseudonyms cannot be connected.In addition,to solve the problem of communication channel congestion,one-way hash function is utilized to hide message,that is,the message does not need to be transmitted with the generated signature in the channel,which reduces the communication overhead of the protocol.
Keywords/Search Tags:IoT, IBS, Secret sharing, Chebyshev polynomial
PDF Full Text Request
Related items