期刊文献+

工业物联网中基于PUFs轻量级的密钥交换协议研究 被引量:4

PUFS-BASED LIGHTWEIGHT KEY EXCHANGE PROTOCOL IN IIOT
下载PDF
导出
摘要 为了保障数据的安全性和隐私性,防止恶意用户访问传感器设备,针对工业物联网提出一种轻量级的认证与密钥交换协议。该协议采用物理不可克隆函数,模糊提取器保障传感器设备的安全。同时采用单向散列函数、异或操作和对称加解密等技术建立安全的会话通道。实验结果表明,相比于其他认证方案,该协议有效减少了密钥交换的通信和计算开销,所提出的协议适用于资源受限的传感器设备且能够抵抗现有多种已知攻击。 To protect the security and privacy of data and prevent malicious users from accessing sensor devices,this paper proposes a lightweight authentication and key exchange protocol.The protocol adopted physical unclonable function and the fuzzy extractor to ensure the security of sensor equipment.Meanwhile,one-way hash function,bit-wise XOR operation and symmetric encryption/decryption were used to establish a secure session channel.The experimental results show that compared with other authentication schemes,the proposed protocol effectively reduces the communication and computing overhead of key exchange.It is suitable for resource constrained sensor devices and can resist a variety of known attacks.
作者 夏艳东 戚荣鑫 季赛 Xia Yandong;Qi Rongxin;Ji Sai(Network Information Center,Nanjing University of Information Science and Technology,Nanjing 210044,Jiangsu,China;School of Computer and Software,Nanjing University of Information Science and Technology,Nanjing 210044,Jiangsu,China)
出处 《计算机应用与软件》 北大核心 2022年第3期316-321,共6页 Computer Applications and Software
基金 国家自然科学基金项目(61672290)。
关键词 工业物联网 物理不可克隆函数 模糊提取器 密钥交换 IIoT Physical unclonable function(PUF) Fuzzy extractor Key exchange
  • 相关文献

参考文献10

二级参考文献62

  • 1王飞跃.人工社会、计算实验、平行系统——关于复杂社会经济系统计算研究的讨论[J].复杂系统与复杂性科学,2004,1(4):25-35. 被引量:230
  • 2崔莉,鞠海玲,苗勇,李天璞,刘巍,赵泽.无线传感器网络研究进展[J].计算机研究与发展,2005,42(1):163-174. 被引量:730
  • 3杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5GASSEND B, CLARKE D, VANDIJK M, et al. Delay-based circuit authentication and applications[ C]// ACM Symposium on Applied Computing. New York: ACM, 2003:294 - 301.
  • 6PAPPU R S. Physical one-way functions[ D]. Boston: Massachusetts Institute of Technology, 2001.
  • 7LIM D, Extracting secret keys from integrated circuits[ D]. Boston: Massachusetts Institute of Technology, 2004.
  • 8LEE JW, LIM D, GASSEND B, et al. A technique to build a secret key in integrated circuits for identification and authentication application[ C] // Proceedings of the Symposium on VLSI Circuits. Washington, DC: IEEE Computer Society, 2004:176 - 159.
  • 9KUMAR S, GUAJARDO J, MAES R, et al. The butterfly PUF protecting IP on every FPGA[ C]//IEEE International Workshop on Hardware-oriented Security and Trust. Washington, DC: IEEE Computer Society, 2008 : 67 - 70.
  • 10OZTURK E, HAMMOURI G, SUNAR B. Towards robust low cost authentication for pervasive devices [ C ]// Proceedings of the Sixth IEEE International Conference on Pervasive Computing and Communication. Washington, DC: IEEE Computer Society, 2008:170 - 178.

共引文献185

同被引文献33

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部