期刊文献+

基于IBE策略的物联网终端设备间的身份认证方案 被引量:6

IBE-based authentication scheme for Internet of Things terminal devices
下载PDF
导出
摘要 随着物联网终端设备间直接通信的需求不断增大,为解决物联网终端设备间安全通信和隐私保护问题,终端设备间认证技术成为人们关注的一个热点,业界诸多学者已经对此展开相关研究并提出多种物联网终端设备间的认证机制。但是,上述机制在安全强度及抵抗攻击效果方面尚存在不足。为解决此问题,该文提出一种基于IBE策略的物联网终端设备身份认证方案,实现终端设备之间匿名双向认证,同时使用椭圆曲线加密算法保证认证过程中信息传输的安全性。通过安全性理论分析和性能分析表明,该方案可很好地抵抗重放攻击、中间人攻击和篡改攻击等已知攻击且具有较低的计算开销。 Along with qrowing demand of direat communicootion between the Internet of Things terminal equipments,in order to solve the Internet of Things secure communication between terminal equipment and privacy problem,authentication techniques between terminal equipments become a hot spot of people,many scholars have a related industry research and put forward a variety of IoT authentication mechanism between the terminal equipment.However,the above mechanism is still insufficient in terms of security intensity and anti-attack effect.In order to solve this problem,this paper proposes an authentication scheme of Internet of Things terminal devices based on IBE strategy,which realizes anonymous two-way authentication between terminal devices,and uses elliptic curve encryption algorithm to ensure the security of information transmission during authentication.The analysis of security theory and performance shows that the scheme can resist replay attack,man-in-the-middle attack,tamper attack and other known attacks.
作者 李秋月 赵艳 李世明 於家伟 高胜花 Li Qiuyue;Zhao Yan;Li Shiming;Yu Jiawei;Gao Shenghua(College of Computer Science and Information Engineering,Harbin Normal University,Harbin 150025,China;School of Physics and Electronic Information,Luoyang Normal University,Luoyang 471022,China;Shanghai Key Laboratory of Information Security Management Technology Research,Shanghai 200240,China)
出处 《信息技术与网络安全》 2020年第3期6-9,22,共5页 Information Technology and Network Security
基金 上海市信息安全管理技术研究重点实验室开放课题(AGK2015003)
关键词 物联网安全 物联网终端设备认证 IBE策略 双向认证 Internet of Things security IoT trust ID identity-based encryption strategy two-way authentication
  • 相关文献

参考文献3

二级参考文献21

  • 1Rivas D A,Barcelo-Ordinas J M,Zapata M G,et al.Security on VANETs:privacy,misbehaving nodes,falseinformation and secure aggregation[J].Journal of Networkand Computer Applications,2011,34(6):1942-1955.
  • 2Sun Y,Lu R,Lin X,et al.An efficient pseudonymousauthentication scheme with strong privacy preservationfor vehicular communications[J].IEEE Transactions onVehicular Technology,2010,59(7):3589-3603.
  • 3Sun J,Zhang C,Zhang Y,et al.An identity-based securitysystem for user privacy in vehicular ad hoc networks[J].IEEE Trans on Parallel and Distributed Systems,2010,21(9):1227-1239.
  • 4Wasef A,Shen X.EMAP:expedite message authenticationprotocol for vehicular ad hoc networks[J].IEEETrans on Mob on Comput,2013,12:78-89.
  • 5Hubax J P,Capkun S,Luo J.The security and privacyof smart vehicles[J].IEEE Security & Privacy Magazine,2004,2(3):49-55.
  • 6Raya M,Hubaux J P.The security of vehicular ad hocnetworks[C].Proc of ACM.New York:ACM,2005:39-68.
  • 7Papadimitratos P,Buttyan L,Hubaux J P,et al.Architecturefor secure and private vehicular communications[C].Proc of IEEE Conf on ITS Telecommunications.Piscataway,NJ:IEEE,2007:1-6.
  • 8Lin X,Sun X,Ho P H,et al.GSIS:a secure and privacypreservingprotocol for vehicular communications[J].IEEE Transactions on Vehicular Technology,2007,56(6):3442-3456.
  • 9Lu R,Lin X,Zhu H,et al.ECPP:efficient conditionalprivacy preservation protocol for secure vehicular communications[C].Proc IEEE INFOCOM,2008:1229-1237.
  • 10Zhang C,Lu R,Lin X,et al.An efficient identity-basedbatch verification scheme for vehicular sensor networks[C].Proceedings of IEEE INFOCOM,2008:246-250.

共引文献129

同被引文献50

引证文献6

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部