期刊文献+

基于多路密钥协商的物联网安全通信方法

A Secure Communication Scheme Based on Multipath Key Agreement for Internet of Things
下载PDF
导出
摘要 物联网具有终端异构、信息传输复杂、应用安全要求多样化等特点,并且物联网的终端大多处理能力有限,因此物联网中通信的安全问题较互联网更为严峻,而传统的单路传输安全方法无法在保证安全的同时降低运算的复杂度,不太适用于物联网环境。针对上述问题,提出将传统的加密技术与多路传输相结合,设计一种端到端的安全多路通信方法。该方法的基本思想是通信双方选择多条不同的传输路径,采用Diffie-Hellman算法进行密钥协商,将密钥协商信息分片并根据选择的路径发送给接收方,这样便协商出一个安全的会话密钥。然后,发送方使用该密钥加密数据并将得到的密文分片经多路传输。分析表明,相比于单路传输的安全通信方法能更好地对抗中间人攻击、密钥破解等安全问题,并在一定程度上降低运算复杂度。 Due to the unique characteristics in IoT, such as heterogeneous and processing capacity limited terminals, complex in-formation transmission process and diverse applications, communication security is much more complicated compared with the In-ternet.Moreover, the existing single-path transportation security methods can not ensure safety and reduce computation complexi-ty at the same time, which makes these methods not suitable for the IoT.In view of the above issues, this thesis proposes an end-to-end secure communication method for the IoT, combining encryption and authentication technology with multipath transporta-tion.The basic idea was as follow: both terminals carried on key agreement scheme based on the Diffie-Hellman algorithm. Then, the sender used the session key obtained in the above stage and the symmetric encryption algorithm to encrypt data and split the encrypted data into segments, which were then sent to the receiver through multiple independent paths.Theoretical anal-ysis shows that this method can be better against security threats such as man-in-the-middle attack, key crack, with reduced com-puting complexity to a certain extent compared with the single-path transportation secure method.
作者 谢婉娟
出处 《计算机与现代化》 2015年第2期86-89,94,共5页 Computer and Modernization
关键词 物联网 多路传输 安全通信 DIFFIE-HELLMAN算法 密钥协商 Internet of Things multipath transportation secure communication Diffie-Hellman algorithm key agreement
  • 相关文献

参考文献16

  • 1Auto-ID Labs.Auto-ID Labs home Page[DB/OL].http://www.autoidlabs.org/page.html, 2014-05-11.
  • 2International Telecommunication Union.Internet Reports 2005: The Internet of Things[R].Geneva: ITU, 2005.
  • 3ITU-T, Recommendation Y.2060-2012.Overview of the Internet of things[S].
  • 4物联网在线.国际电信联盟正式通过“物联网概述”(Y.IoT-overview)标准草案[EB/OL].http://www.iot-online.com/zhengce/2012/0327/17982.html, 2014-03-11.
  • 5杨庚,许建,陈伟,祁正华,王海勇.物联网安全特征与关键技术[J].南京邮电大学学报(自然科学版),2010,30(4):20-29. 被引量:131
  • 6肖毅.物联网安全管理技术研究[J].通信技术,2011,44(1):69-70. 被引量:28
  • 7刘宴兵,胡文平,杜江.基于物联网的网络信息安全体系[J].中兴通讯技术,2011,17(1):17-20. 被引量:27
  • 8Babar S, Mahalle P, Stango A, et al.Proposed security model and threat taxonomy for the internet of things (IoT)[M]// Recent Trends in Network Security and Applications.Springer Berlin Heidelberg, 2010:420-429.
  • 9王小妮,魏桂英.物联网RFID系统数据传输中密码算法的研究[J].北京信息科技大学学报(自然科学版),2009,24(4):75-78. 被引量:25
  • 10Kothmayr T, Schmitt C, Hu W, et al.A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication[C]// Proc.the 37th IEEE International Conference on Pervasive Computing and Communication.2012:956-96.

二级参考文献61

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2宁焕生,张瑜,刘芳丽,刘文明,渠慎丰.中国物联网信息服务系统研究[J].电子学报,2006,34(B12):2514-2517. 被引量:151
  • 3http://www.epcglobalinc.org/.
  • 42010年政府工作报告[EB/OL].中国网,2010-3-15.
  • 5HAMAD F,SMALOV L,JAMES A.Energy-aware security in M-commerce and the Internet of Things[J].IETE,Technical review,2009,26(5):357-362.
  • 6WATRO R,KONG D,et al.TinyPK:Securing sensor networks with public key technology[C]∥ Proc of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM press,2004:59-64.
  • 7BENENSON Z,GEDICKE N,RAIVIO O.Realizing robust user authentication in sensor networks[C]∥Proc of the Workshop on Real-World Wireless Sensor Networks(REALWSN 2005).[S.l.]:Stockholm,2005.135-142.
  • 8MALAN D J,WELSH M,SMITH M D.A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography[C]∥ 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks.Piscataway:IEEE,2004:71-80.
  • 9OUADJAOUT A,CHALLAL Y,LASLA N,et al.SEIF:Secure and efficient intrusion-fault tolerant routing protocol for wireless sensor networks[C]∥Proc of the Third International Conference on Availability,Reliability and Security(ARES 2008).Piscataway:IEEE,2008:503-508.
  • 10MA R,XING L D,MICHEL H E.A new mechanism for achieving secure and reliable data transmission in wireless sensor networks[C]∥Proc of the 2007 IEEE Conference on Technologies for Homeland Security:Enhancing Critical Infrastructure Dependability.Piscataway:IEEE,2007:274-279.

共引文献193

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部