期刊文献+

基于非对称方式的物联网通信协议 被引量:5

Communication Protocol for Internet of Things Based on Asymmetric Mode
下载PDF
导出
摘要 物联网节点由于有限的尺寸和能量,其计算能力和存储空间一般会受到限制。为此,采用非对称方式,提出一种新的物联网通信协议。通过物联网节点与就近的服务器之间建立通信链路的方式,将原本由单一物联网节点执行的任务,转换为节点和服务器协作执行,将任务负载量在节点和服务器两端进行非对称分配,由服务器执行较高复杂度的运算,从而减少在节点端进行数据运算的能量消耗,满足物联网元件的节能需求。仿真结果表明,与传统的RSA加解密运算相比,利用非对称方式进行RSA加解密运算,可使物联网节点的运算时间和能量消耗减少20%以上,该协议能有效提高物联网节点的计算效率,延长节点的生命周期。 Due to the limited size and energy,the computing power and storage space of Internet of Things(IoT) nodes are always limited. For this problem, this paper proposes and designs a kind of loT communication protocol based on asymmetric mode. The protocol establishes the communication link between loT nodes and nearest server, and transforms the task which is originally executed by single node to compute between node and server. The protocol asymmetrically distributes between node and server, and assigns the server a more complex calculation, thus reduces the energy consumption of calculating of nodes, and realizes the energy-saving demand of loT nodes. Simulation results show that compared with traditional RSA encryption and decryption operations, the asymmetric mode can significantly reduce the calculate time and energy consumption, the range is about 20%. The protocol proposed in this paper effectively improves the computation efficiency, and prolongs the life of nodes.
出处 《计算机工程》 CAS CSCD 北大核心 2016年第2期113-117,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61272500) 山东省高等学校科技计划基金资助项目(J14LN80) 北京市自然科学基金资助项目(4142008)
关键词 物联网 非对称方式 通信协议 负载分配 协作计算 RSA加解密 Internet of Things (IoT ) asymmetric mode communication protocol load distribution collaborativecomputing RSA encryption and decryption
  • 相关文献

参考文献12

二级参考文献41

  • 1霍宏伟,张宏科,郜帅,牛延超.一种IPv6无线传感器网络节点的设计与实现[J].计算机应用,2006,26(2):303-306. 被引量:14
  • 2霍宏伟,牛延超,郜帅,张宏科.一种IPv6无线传感器网络以太网接入网关的设计[J].传感技术学报,2007,20(2):398-403. 被引量:12
  • 3GB1562911[S].无线认证保密基础设施(WAPI)中华人民共和国国家标准.[S].,2003..
  • 4Gabriele W, Volker K. Formal Semantics for Authentication Logics[A]. Computer Security-ESORIC 96: LNCS 1146[C]. Berlin: Springer-Verla g, 1996. 215-241.
  • 5IEEE P802.11i D3.0. Specification for Enhanced Security[DB/OL]. http://www.cs.umd.edu/~mhshin/doc/802.11/802.11i-D3.0.pdf, 2002-11-30.
  • 6Canetti R, Krawczyk H. Analysis of Key-exchange Protocol and Thei r Use for Building Secure Channels[A]. Proceeding of Eurocrypt 2001: LNCS 2045[C]. Berlin: Springer-Verlag, 2001. 453-474.
  • 7IEEE P1363: Standard Specifications for Public Key cryptography[D B/OL]. http://grouper.ieee.org/groups/1363, 1999-12-20.
  • 8Diffie W, Oorschot P, Wiener M. Authentication and Authenticated K ey Exchanges[J].Designs, Codes and Cryptography,1992,2(2):107-125.
  • 9European Research Projects on the Internet of Things(CERP-IoT) Strategic Research Agenda(SRA). Internet of things strategic research roadmap [EB/OL]. [2011-12-01]. http://ec. europa. eu/information_ society/policy/rfid/document s/in_cerp, pdf.
  • 10Commission of the European communities. Internet of Things in 2020 [EB/OL]. [2011- 12-01]. http: //www. umic. pt/ images/stories/puhlicacoes2/Internet-d-Things_in_202o EC- EPoSS_Workshop_Report_2008 v3. pdf.

共引文献46

同被引文献31

引证文献5

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部