Font Size: a A A

Research On Lightweight Authentication Technology Of Perception Layer Of Internet Of Things

Posted on:2022-08-21Degree:MasterType:Thesis
Country:ChinaCandidate:X C ZhuFull Text:PDF
GTID:2518306602993409Subject:Cryptography
Abstract/Summary:PDF Full Text Request
In recent years,with the deepening of the research on the Internet of things(Io T),Io T and its related applications have received unprecedented attention from the academic and industrial circles,showing an explosive growth trend,but its security problems are increasingly prominent,and become one of the core problems hindering its further development.As a heterogeneous fusion network with multiple networks,Io T not only shares security problems with the Internet and mobile communication network,but also has some unique security problems,such as user privacy protection,network security authentication and access control,information security storage and management,etc.Among them,the security problem of Io T perception layer is especially prominent.Without the effective security authentication mechanism,the attackers can use devices with strong endurance,excellent storage and computing capabilities to attack any large number of perceptual nodes deployed in the perceptual network with limited storage and computing capabilities,and then parse the identity information and privacy information of the perceptual nodes,and pose a great security threat to the information or data collected by the perception layer.Therefore,it is very important to study the lightweight authentication technology of Io T perception layer.On the basis of studying the existing Io T authentication technology,proposes two lightweight authentication protocols suitable for Io T perception layer are proposed in this thesis,which realize the secure and efficient authentication of the identity information of the perceptual node and the broadcast message in the perceptual network.Specifically,the following research contents are mainly included:Firstly,a lightweight identity-based authentication protocol without bilinear pairings(ID-based LAP)is proposed.The private key of the perceptual node in the authentication protocol is generated by two trusted third parties,and neither party can obtain all the private key information of the node.Even if one of them is captured,the attacker can not know the complete private key of the perceptual node in the perceptual network,thus solving the key escrow problem in the traditional authentication protocol based on identity signature.Furthermore,the process of signature generation and signature verification does not require the bilinear pairings with large computing overhead,and the batch verification algorithm and the invalid message Seaarch(IMS)algorithm are introduced.Secondly,a lightweight certificateless authentication protocol without bilinear pairings(CL-LAP)is proposed,which has neither the problem of certificate overhead and management difficulties in the public key infrastructure based authentication protocol,nor the key escrow problem in the traditional identity-based authentication protocol.The signature generation and signature verification processes do not require bilinear pairings which has large computing overhead,and the batch verification algorithm and IMS algorithm are introduced.Finally,based on the difficulty of solving the discrete logarithm problem on elliptic curves,the proposed ID-based LAP and CL-LAP are proved to be existentially unforgeable on adaptively chosen message and identity attacks under the random oracle model,and can resist impersonation attacks,forgery attacks,information tampering,replay attacks and other common attacks in the perception layer of Io T.Then,the performance simulation of the proposed two lightweight authentication protocols is carried out to test their authentication efficiency and compare the performance with the existing same type authentication protocols.The results show that the proposed lightweight authentication protocol ID-based LAP and CL-LAP computing and communication overhead are small and suitable for Io T perception layer with limited storage and computing power.
Keywords/Search Tags:Internet of Things, Perception Layer Security, Lightweight, Authentication Protocol, Random Oracle Model
PDF Full Text Request
Related items