期刊文献+

物联网中的隐私保护问题研究 被引量:4

RESEARCH ON PRIVACY PROTECTION IN INTERNET OF THINGS
下载PDF
导出
摘要 在物联网中的认证和密钥协商过程中,如果用户的身份信息以明文的形式传输,攻击者可能追踪用户的行动轨迹,从而造成信息泄漏。针对大多数基于身份的认证和密钥协商协议不能保护用户隐私的问题,提出一个基于身份的匿名认证和密钥协商协议。在设计的认证和密钥协商方案中,用户的身份信息以密文的形式传输,解决了用户的隐私问题。 In the process of authentication and key agreement in Internet of Things,if users'identity information is sent in plaintext form, the attackers may track users'action trajectory,which results in information disclosure.Most of the existing identity-based remote authentica-tions and key agreement schemes are not designed for protecting user's privacy.This paper presents an identity-based remote authentication and key agreement with anonymity.In the authentication and key agreement schemes designed,the problem of user's privacy protection is ad-dressed by sending user's identity information in ciphertext form.
出处 《计算机应用与软件》 CSCD 2015年第6期278-279,327,共3页 Computer Applications and Software
基金 国家自然科学基金项目(61402529) 湖南省科技工业支撑计划项目(2012GK3120)
关键词 匿名 隐私保护 认证 密钥控制 物联网 Anonymity Privacy protection Authentication Key control Internet of Things
  • 相关文献

参考文献18

  • 1夏文栋.基于3G-WLAN交互系统的物联网研究[J].微电子学与计算机,2011,28(7):139-142. 被引量:4
  • 2吴振强,周彦伟,马建峰.物联网安全传输模型[J].计算机学报,2011,34(8):1351-1364. 被引量:73
  • 3宁焕生,徐群玉.全球物联网发展及中国物联网建设若干思考[J].电子学报,2010,38(11):2590-2599. 被引量:311
  • 4El Gamal T.A public key cryptosystem and a signature protocol based on discrete logarithms[J].IEEE Transactions on Information,1985,31:469-472.
  • 5He D,J Chen,Hu J.Au ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security[J].Information Fusion,2012,13:223-230.
  • 6Koblitz N,Menezes A,Vanstone S.The state of elliptic curve cryptography[J].designs,codes and cryptography,2000,19(2-3):173-193.
  • 7Batina L,Mentens N,Sakiyama K,et al.Low-cost elliptic curve cryptography for wireless sensor networks[C].ESAS,2006,LNCS 4357:6-17.
  • 8He D.An efficient remote user authentication and key agreement protocol for mobile-server environment from pairings[J].Ad Hoc Networks,2012,10:1009-1016.
  • 9Ammayappan K,Negi A,Sastry V.An ECC-based two-party authenticated key agreement protocol for mobile ad hoc networks[J].Journal of Computers,2011,6(11):2408-2416.
  • 10Hong J,Yoon S,Park D,et al.A new efficient key agreement for VAST satellite communications based on elliptic curve cryptosystem[J].Information Technology and Control,2011,40(3):2008-2016.

二级参考文献22

共引文献380

同被引文献19

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部