用于物联网智能设备之间安全通信的轻量级数字签名方法研究

发布时间:2021-04-17 04:29
  物联网中的很多智能设备可以通过网络完成在线信息交互。对于医疗健康来说,智能设备可以监测健康数据并将其存储在数据库中。与此同时,传输信息的安全成为数据传输和接收过程中必须解决的问题。为了防止他人恶意攻击,需要在特定安全强度下,对智能设备中的签名方案设计更加轻量级的操作以保证通信安全。为了解决大量数据签名和验证过程中计算开销过大的问题,本文使用更简洁的操作来实现签名和验证,同时使用简化的复杂数字签名算法来保障物联网中智能设备间的通信安全。此外,本文还提出了多选项参数选择方法,该方法利用不同签名作为每个文档关键级别的特殊索引表达上的签名验证对,并且可通过增强安全强度来抵抗流量分析攻击。本文提出一种基于物理不可克隆函数(PUF)的安全方案,利用IC创建过程中产生的随机因素生成各种不匹配,唯一且不同的挑战-应答对,将其存储在数据库中,用于物联网中智能设备之间的安全关联。基于内存和模拟电子的PUF大多被用来提供可靠的安全属性,其中基于MOS晶体管的PUF,由于其尺寸较小,在运行中会存在各种各样的失配问题。针对此类问题,本文设计了基于PUF的身份认证方案,模拟会话密钥以确保物联网智能设备之间的信息交... 

【文章来源】:北京科技大学北京市 211工程院校 教育部直属院校

【文章页数】:133 页

【学位级别】:博士

【文章目录】:
致谢
摘要
Abstract
LIST OF NOTATIONS
LIST OF ABBREVIATIONS
CHAPTER 1 INTRODUCTION
    1.1 INTERNET OF THINGS (IOT)
    1.2 APPLICATIONS OF IOT
        1.2.1 Smart Sensing
        1.2.2 Radio-Frequency Identification (RFID)
        1.2.3 Smart Devices Network
        1.2.4 Smart Healthcare
        1.2.5 Smart Life and Society
    1.3 BACKGROUND OF RESEARCH
    1.4 OBJECTIVES
    1.5 CONTRIBUTIONS OF RESEARCH
    1.6 THESIS STRUCTURE
CHAPTER 2 LITERATURE REVIEW
    2.1 INTERNET OF THINGS AND DIGITAL SIGNATURES
    2.2 RFID TECHNOLOGY AND INTERNET OF THINGS
    2.3 PHYSICAL UNCLONABE FUNCTION BASED AUTHENTICATION AND KEY GENERATION
    2.4 DIGITAL SIGNATURE BASED SCHEMES
        2.4.1 Key Distribution and Signature Schemes based on DLP
        2.4.2 Key Distribution and Signature Schemes based on IFP
        2.4.3 Signature Schemes based on Combination of IFP and DLP
        2.4.4 Key Distribution and Signature Schemes based on IFP
        2.4.5 More Key Distribution and Signature Schemes
    2.5 LOGICAL TREE BASED KEY ESTABLISHMENT SCHEMES
    2.6 PROBLEM IDENTIFICATION
        2.6.1 Problem 1: Complex and Costly Digital Signatures
        2.6.2 Problem 2: Clonablity forAuthentication
        2.6.3 Problem 3: Mobility based Unnecessary Rekeying
CHAPTER 3 LIGHTWEIGHT DIGITAL SIGNATURE BASED SECURITY SCHEME
    3.1 SHORTENED COMPLEX DIGITAL SIGNATURE ALGORITHM
    3.2 SCDSA-SIGNATURE AND VERIFICATION PROCESSES
        3.2.1 Basic Parameters
        3.2.2 Key Generation
        3.2.3 Signature Process
        3.2.4 Verification Process
    3.3 Multi-option Parameter Selection(MPS-SCDSA)
    3.4 Formal Modeling and Analysis of SCDSA
    3.5 Results and Analysis
        3.5.1 Security Analysis
        3.5.2 Time Consumption for Signature Operation
        3.5.3 Verification Time Consumption
        3.5.4 Verification Time for Message Length Variations
        3.5.5 Communication Overhead
        3.5.6 Resilience
    3.6 SUMMARY
CHAPTER 4 PHYSICAL UNCLONABLE FUNCTION BASED AUTHENTICATION SCHEME FOR SMARTDEVICES IN IOT
    4.1 INTRODUCTION
    4.2 PUF BASED AUTHENTICATION SCHEME(PAS)
    4.3 REGISTRATION AND AUTHENTICATION PHASE
    4.4 SECURE COMMAND EXECUTION PROTOCOL
    4.5 RESULTS AND ANALYSIS
    4.6 SUMMARY
CHAPTER 5 LOGICAL TREE BASED SECURE REKEYING MANAGEMENT FOR SMART DEVICESGROUPS IN IOT ENABLED WSN
    5.1 INTRODUCTION
    5.2 SYSTEM MODEL FOR MULTICASTING MESSAGES
    5.3 GROUP DEPLOYMENT
    5.4 NEW NODE JOINING PROTOCOL
    5.5 NODE MIGRATION PROTOCOL
    5.6 FORMAL MODELING AND ANALYSIS
    5.7 RESULTS AND ANALYSIS
        5.7.1 Message Exchange Analysis
        5.7.2 Energy Utilization
        5.7.3 Rekeying
        5.7.4 Resilience
    5.8 SUMMARY
CHAPTER 6 CONCLUSION
BIBLIOGRAPHY
作者简历及在学研究成果
学位论文数据集


【参考文献】:
期刊论文
[1]A Quantized Kernel Least Mean Square Scheme with Entropy-Guided Learning for Intelligent Data Analysis[J]. Xiong Luo,Jing Deng,Ji Liu,Weiping Wang,Xiaojuan Ban,Jenq-Haur Wang.  中国通信. 2017(07)



本文编号:3142811

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/shengwushengchang/3142811.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户0150a***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com