多群组认证和密钥协商机制研究
发布时间:2018-09-02 07:38
【摘要】:随着移动通信技术的快速增加,业务类型越来越丰富,除了传统的语音和数据业务,手机购物、打车、购票、订餐等各种新兴移动业务正快速兴起,使得传统的蜂窝网络面临着巨大的挑战,如网络拥塞严重。另外,大量敏感的数据暴露在无线信道上传输,极大地限制移动通信的发展。由此,通过组通信来和允许终端之间进行通信的D2D(Device-to-Device)技术应运而生。D2D通信在减轻蜂窝网络负担、扩大通信范围以及传输速率等方面具有巨大优势。如何对用户的通信内容进行保护,防止个人隐私信息泄露,抵御非法用户攻击,保障用户的合法权益,是组通信的重要研究内容之一。因此,本课题针对网络拥塞问题和通信过程中的存在的安全隐患,结合4G MTC(Machine Type Communication)设备和D2D通信中设备的特点,以加密技术为基础,按照用户的需求和组通信特点,提出了有效的安全认证和密钥协商方案。研究内容如下:(1)对比分析4G组通信中几种组认证和密钥协商的特点,首先,总结群组通信相比传统通信在大规模MTC设备访问核心网络时存在的优劣势。然后,简要介绍了本文所用的密码理论,数学理论以及无证书认证体制,接着,阐述了D2D通信的特点,安全威胁和安全需求,为后文的理论研究奠定基础。(2)研究基于多群组和设备侧密钥分发的安全认证和密钥协商。现有的4G组认证存在处理的设备有限,安全性不足等局限性。针对此问题,本文研究了多群组的设备侧认证和密钥协商策略,结合聚合签名技术,实现认证信息的聚合,数据的认证性和完整性。此外,本文还考虑了4G通信中系统存在的蓄意、攻击节点的破坏行为。理论分析和仿真结果表明,该方案可以有效地减少带宽的消耗,减轻核心网的网络拥塞,提升4G链路建立的安全性。(3)研究D2D通信中基于ECC的无证书的安全组认证。现有的安全组通信研究未充分考虑大量D2D用户设备组通信,用户设备的处理能力等问题,针对此问题,该方案基于D2D的安全组通信,采用无证书认证和椭圆曲线加密两种技术。为了避免D2D用户的动态加入和离开,D2D组需要执行密钥的更新。该方案在密钥更新方面,相对已有的方案复杂度较低,有效地抵抗常见的攻击,如前向攻击,后向攻击,可以充分地保证系统的安全性。本文研究工作在解决网络日益拥塞的瓶颈问题以及确保安全认证和密钥协商方面具有十分重要的理论意义和使用价值。
[Abstract]:With the rapid increase of mobile communication technology, the types of business are becoming more and more abundant. Besides the traditional voice and data services, mobile phone shopping, taxi, ticketing, ordering and other new mobile services are rising rapidly. Traditional cellular networks are facing enormous challenges, such as severe network congestion. In addition, a large number of sensitive data are exposed to the wireless channel transmission, greatly limiting the development of mobile communications. As a result, D2D (Device-to-Device) technology, which uses group communication and allows communication between terminals, has great advantages in reducing the burden of cellular network, expanding communication range and transmission rate. How to protect the user's communication content, prevent the personal privacy information from leaking, resist the illegal user attack, protect the user's legitimate rights and interests, is one of the important research contents of the group communication. Therefore, this subject aims at the network congestion problem and the hidden danger in the communication process, combining the characteristics of 4G MTC (Machine Type Communication) equipment and D2D communication equipment, based on encryption technology, according to the needs of users and the characteristics of group communication. An effective security authentication and key agreement scheme is proposed. The research contents are as follows: (1) the characteristics of group authentication and key agreement in 4G group communication are analyzed. Firstly, the advantages and disadvantages of group communication compared with traditional communication in accessing the core network of large-scale MTC devices are summarized. Then, the cryptographic theory, mathematical theory and certification-free authentication system used in this paper are briefly introduced. Then, the characteristics, security threats and security requirements of D2D communication are described. (2) Security authentication and key agreement based on multi-group and device-side key distribution are studied. The existing 4G group authentication has some limitations such as limited processing equipment, insufficient security and so on. In order to solve this problem, this paper studies the device side authentication and key agreement strategy of multi-group, and combines the technology of aggregate signature to realize the aggregation of authentication information, the authentication and integrity of data. In addition, this paper also considers the vandalism of the system in 4G communication. Theoretical analysis and simulation results show that the proposed scheme can effectively reduce bandwidth consumption, reduce network congestion in core networks, and improve the security of 4G link establishment. (3) the authentication of secure group without certificates based on ECC in D2D communication is studied. The existing research on security group communication has not fully considered a large number of D2D user equipment group communication, user equipment processing ability and so on. In view of this problem, this scheme is based on D2D secure group communication, adopting two kinds of techniques: certificate free authentication and elliptic curve encryption. In order to avoid D2D users joining and leaving D2D group dynamically, we need to perform key update. Compared with the existing schemes, the proposed scheme has lower complexity and can effectively resist common attacks, such as forward attack and backward attack, which can fully guarantee the security of the system. The research work in this paper is of great theoretical significance and practical value in solving the bottleneck problem of increasing network congestion and ensuring secure authentication and key agreement.
【学位授予单位】:南京邮电大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TN918.4
本文编号:2218698
[Abstract]:With the rapid increase of mobile communication technology, the types of business are becoming more and more abundant. Besides the traditional voice and data services, mobile phone shopping, taxi, ticketing, ordering and other new mobile services are rising rapidly. Traditional cellular networks are facing enormous challenges, such as severe network congestion. In addition, a large number of sensitive data are exposed to the wireless channel transmission, greatly limiting the development of mobile communications. As a result, D2D (Device-to-Device) technology, which uses group communication and allows communication between terminals, has great advantages in reducing the burden of cellular network, expanding communication range and transmission rate. How to protect the user's communication content, prevent the personal privacy information from leaking, resist the illegal user attack, protect the user's legitimate rights and interests, is one of the important research contents of the group communication. Therefore, this subject aims at the network congestion problem and the hidden danger in the communication process, combining the characteristics of 4G MTC (Machine Type Communication) equipment and D2D communication equipment, based on encryption technology, according to the needs of users and the characteristics of group communication. An effective security authentication and key agreement scheme is proposed. The research contents are as follows: (1) the characteristics of group authentication and key agreement in 4G group communication are analyzed. Firstly, the advantages and disadvantages of group communication compared with traditional communication in accessing the core network of large-scale MTC devices are summarized. Then, the cryptographic theory, mathematical theory and certification-free authentication system used in this paper are briefly introduced. Then, the characteristics, security threats and security requirements of D2D communication are described. (2) Security authentication and key agreement based on multi-group and device-side key distribution are studied. The existing 4G group authentication has some limitations such as limited processing equipment, insufficient security and so on. In order to solve this problem, this paper studies the device side authentication and key agreement strategy of multi-group, and combines the technology of aggregate signature to realize the aggregation of authentication information, the authentication and integrity of data. In addition, this paper also considers the vandalism of the system in 4G communication. Theoretical analysis and simulation results show that the proposed scheme can effectively reduce bandwidth consumption, reduce network congestion in core networks, and improve the security of 4G link establishment. (3) the authentication of secure group without certificates based on ECC in D2D communication is studied. The existing research on security group communication has not fully considered a large number of D2D user equipment group communication, user equipment processing ability and so on. In view of this problem, this scheme is based on D2D secure group communication, adopting two kinds of techniques: certificate free authentication and elliptic curve encryption. In order to avoid D2D users joining and leaving D2D group dynamically, we need to perform key update. Compared with the existing schemes, the proposed scheme has lower complexity and can effectively resist common attacks, such as forward attack and backward attack, which can fully guarantee the security of the system. The research work in this paper is of great theoretical significance and practical value in solving the bottleneck problem of increasing network congestion and ensuring secure authentication and key agreement.
【学位授予单位】:南京邮电大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TN918.4
【参考文献】
相关期刊论文 前2条
1 赵小强;雷雪;冯勋;;基于ZigBee/3G的物联网网关系统[J];西安邮电大学学报;2015年01期
2 卢建军;;基于物联网的工业化与信息化模式研究[J];西安邮电学院学报;2010年06期
相关博士学位论文 前1条
1 张瑞;基于椭圆曲线密码的无证书公钥密码研究[D];武汉大学;2011年
相关硕士学位论文 前3条
1 卢昊旗;D2D通信的认证和密钥协商协议研究[D];西安电子科技大学;2014年
2 李洁英;基于群组的MTC认证和密钥协商协议研究[D];西安电子科技大学;2014年
3 史宝明;可证安全的基于身份的数字签名方案研究[D];兰州理工大学;2012年
,本文编号:2218698
本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/2218698.html