期刊文献+

一个改进的椭圆曲线密码体制在物联网传输中的研究应用探讨

An Improved Elliptic Curve Cryptosystem in the Transmission of the Internet of Things Application Study
下载PDF
导出
摘要 因为物联网技术的日新月异,为人类的生活带来了更多的便利,加快了经济生活的发展.该文是基于椭圆曲线密码体制引用于物联网的网络安全传输上的研究。首先分析了几个椭圆曲线应用于物联网的可能存在的可以改进的方面,如密匙的创建没有具体的数字,文字,账号对应来源;部分采用的密匙来源较为单一用到了ID(Identity)号或者IP(Internet Protocol)号创建,因为ID号和IP由设计者自己制定一般是不变,且比较好获取,所有比较容易出现小问题。在分析其他的设计的基础上设计了一个新的ONS查询的协议。 Because of the Internet of things technology changes with each passing day, bring more convenience to human life, to speed up the development of the economic life. This article is Based on the elliptic curve cryptosystem references on the Internet of things network security transmission research. First of all, analyze the application of several elliptic curve on the Internet of things possible can improve the aspects, such as keys to create no specific Numbers, text, corresponding source account; Part adopts the key source of a single use the ID(Identity) number or IP(Internet Protocol) to create, because the ID number and the IP set by the designer himself is generally the same, and better access to, all is easy to appear small problems. On the basis of the analysis of the design of other Protocol designed a new ONS queries.
作者 周鹏 陈秉洁
出处 《电脑知识与技术》 2018年第1X期259-260,265,共3页 Computer Knowledge and Technology
关键词 改进的 椭圆密码体制 物联网传输 improved The elliptical password system Internet transmission
  • 相关文献

参考文献10

二级参考文献56

  • 1崔振山,马春光,李迎涛.物联网感知层的安全威胁与安全技术[J].保密科学技术,2012(11):61-65. 被引量:9
  • 2孙玉砚,刘卓华,李强,孙利民.一种面向3G接入的物联网安全架构[J].计算机研究与发展,2010,47(S2):327-332. 被引量:18
  • 3佟鑫.物联网的定义和应用[J].射频世界,2010(4):20-20. 被引量:9
  • 4周宣武,杨晓元,魏萍,李德龙.基于超椭圆曲线密码的共享验证签名方案[J].计算机工程,2007,33(1):131-132. 被引量:5
  • 5袁艳祥.基于身份的密钥管理研究[D].杭州:杭州电子科技大学,2014.
  • 6RAY B R, ABAWAJY J, CHOWDHURY M. Scalable RFII) security framework and protocol supporting Internet of Things[J]. Computer Networks, 2014, 67(10):89-103.
  • 7Liu C, Yang C, Zhang X, et al. External integrity verification for outsourced big data in cloud and loT: A big picture[J]. Future Generation Computer Systems, 2015, (49): 58-67.
  • 8RAZA S, DUQUENNOY S, HOGLUND J, et al. Secure communication for the lnternet of" Things -a comparison of link- layer security and IPsec for 6LoWPAN[J]. Security & Communication Networks, 2014, 7(12): 2654-2668.
  • 9DESMEDT Y,FRANKEL Y. Shared Generation of Authen- ticators and Signatures [ C ]//FEIGENBAUM. Advances in Cryptology - CRYPTO'91. [S. 1. ]: [s. n. ], 2001:457 - 469.
  • 10邱卫东等,编著.密码协议基础(M)高等教育出版社, 2008

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部