Font Size: a A A

Dynamic Key Generation And Anonymous Authentication Protocol Design For Wireless Devices In Fog Computing Architecture

Posted on:2021-03-27Degree:MasterType:Thesis
Country:ChinaCandidate:H N AnFull Text:PDF
GTID:2568306104471234Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the popularity of Internet of things(Io T)and mobile devices,more and more information need to be shared through wireless communication,and a large number of privacy information will be transmitted through wireless channel.However,due to the low performance and low power consumption of Io T devices and mobile devices,the exposure nature of wireless signals and the shortcomings of traditional encryption methods,it is not convenient to use some traditional encryption methods,and easy to cause privacy leakage.Therefore,we need a scheme that can make both sides of communication generate secret keys dynamically.Wireless devices widely deployed in the Io T environment also need to easily authenticate each other.In view of these shortcomings and requirements,this paper focuses on the dynamic key generation and anonymous authentication methods for smart wireless devices.The main work can be summarized as follows:First,design a dynamic symmetric key generation method based on wireless channel state information(CSI)for wireless devices.This method can make the two communication parties use dynamic CSI to generate the same bits independently at the same time,which can be used as the symmetric key.This thesis uses the phase information obtained from the CSI to quantize,which is less affected by noise and fluctuates greatly when CSI changes.In this method,filtering,adaptive quantization length,increasing quantization discontinuity and quantization methods are proposed,which can improve the performance of bits generation rate,bits matching rate,randomness and security.The symmetric key generated by this method can be used in the protocol designed below.Second,design a lightweight anonymous authentication and dynamic secret key generation protocol for wireless devices in the fog computing architecture.During the registration process,the two devices exchange their IDs and the generated random numbers through a secure channel and generate the pseudonymous for the gateway.Such information is stored for later authentication.During the authentication process,the server uses the pseudonym to match the stored random numbers.Both communication nodes use the protocol and these random numbers to generate a session key and pass new random numbers.The protocol can generate group key for multiple devices and private key between two devices,and can be extended to multiple levels of devices.The protocol integrates the dynamic key generation method based on CSI,which makes up for its shortcomings and has higher security.Finally,the dynamic key generation method is deployed on commercial devices,and a comprehensive security and performance analysis of dynamic key generation method and anonymous authentication protocol are given.The analysis results show that compared with the existing works,the method and protocol in this paper have significant improvement in performance,security and universality.
Keywords/Search Tags:authentication, IoT, fog computing, wireless communication, encryption
PDF Full Text Request
Related items