[1]赵敏[],江凌云[],李占军[]. 基于自签名隐式证书的认证密钥协商协议研究[J].计算机技术与发展,2017,27(05):128-132.
 ZHAO Min[],JIANG Ling-yun[],LI Zhan-jun[]. Research on Authenticated Secret Key Agreement Protocol withSelf-signed Implicit Certificate[J].,2017,27(05):128-132.
点击复制

 基于自签名隐式证书的认证密钥协商协议研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年05期
页码:
128-132
栏目:
安全与防范
出版日期:
2017-05-10

文章信息/Info

Title:
 Research on Authenticated Secret Key Agreement Protocol withSelf-signed Implicit Certificate
文章编号:
1673-629X(2017)05-0128-05
作者:
 赵敏[1] 江凌云[1]李占军[2]
1.南京邮电大学 通信与信息工程学院;2.国家电网辽宁省电力有限公司
Author(s):
 ZHAO Min[1]JIANG Ling-yun[1]LI Zhan-jun[2]
关键词:
 物联网ECQV 隐式证书安全性
Keywords:
 Internet of ThingECQVimplicit certificatesecurity
分类号:
TP393
文献标志码:
A
摘要:
 用户的身份认证和数据的保密传输是物联网信息安全中最基本的需求,而物联网中的终端设备一般呈分布式设置,大多数设备无人值守,因此需要有一个端到端的安全机制来保护物联网中的信息传输;物联网终端受带宽、计算能力和内存等限制,无法部署开销太大的安全协议.为了解决上述问题,提出并设计了一种基于ECQV(Elliptic Curve Qu-Vanstone)自签名隐式证书的认证密钥协商协议,主要基于ECQV自签名隐式证书生成机制和公钥提取机制,可完成感知节点和用户之间的相互认证及安全传输通道的建立,占用内存小,认证效率高.以C语言编写的双向认证密钥协商协议基于Contiki操作系统在WiSMote节点上接受了实验验证和评估分析.实验结果表明,由于ECQV证书比传统证书所需要的数据量小,故减少了带宽的占用,且时间和能量消耗也有降低,效率大幅提升.所设计的协议完全可以部署在资源限制型物联网上,且具有良好的安全性.
Abstract:
 As well known,among all the information security requirements in Internet of Things (IoT) network,user authentication and data transmission confidentiality both are the most essential.However,edge devices in IoT are commonly distributed,and most of them are unattended,so it has become pressing to create an end-to-end security mechanism to secure the information transmission in IoT.Considering the confinations of devices in IoT network are bandwidth,computing power and memory limit,the IoT nodes cannot support heavy security protocol.In order to solve the above problems,a new authenticated key agreement protocol based on ECQV (Elliptic Curve Qu-Vanstone) self-signed implicit certificate has been introduced,which is based primarily on ECQV self-signed certificate generation scheme and ECQV self-signed implicit certificate public key extraction scheme and can perform mutual authentication between the user and node,with smaller footprint and higher authenticate efficiency.This proposed protocol programmed with C language run by Contiki operation system has been tested and evaluated with WiSMote nodes.Experiment results show that the ECQV certificate is smaller than traditional certificate,and thus the system bandwidth has been reduced as well as the time and energy consumption.In general the proposed protocol can be deployed on resource-constrained devices in IoT,and with better secure performance.

相似文献/References:

[1]郭苑 张顺颐 孙雁飞.物联网关键技术及有待解决的问题研究[J].计算机技术与发展,2010,(11):180.
 GUO Yuan,ZHANG Shun-yi,SUN Yan-fei.Research of Key Technologies and Unresolved Questions of Internet of Things[J].,2010,(05):180.
[2]于群英 李媛 杨文荣.基于轻量级J2EE的网站群管理系统开发架构[J].计算机技术与发展,2011,(04):48.
 YU Qun-ying,LI Yuan,YANG Wen-rong.Research of Development Framework of Multi-Websites Management System Based on Lighter J2EE[J].,2011,(05):48.
[3]张捍东 朱林.物联网中的RFID技术及物联网的构建[J].计算机技术与发展,2011,(05):56.
 ZHANG Han-dong,ZHU Lin.RFID Technology and Structure of Internet of Things[J].,2011,(05):56.
[4]任长城 马雏.智能家居中基于认知无线电的通信协议设计[J].计算机技术与发展,2011,(08):14.
 REN Chang-cheng,MA Chu.A Design of Cognitive Radio Communication Protocol in Smart Home[J].,2011,(05):14.
[5]蔡晓 骆德汉 郑魏 余庆悦.基于RFID的家电监控追踪系统的设计实现[J].计算机技术与发展,2011,(10):176.
 CAI Xiao,LUO De-han,ZHENG Wei,et al.Design and Implementation of Household Appliance ts Monitoring and Tracking System[J].,2011,(05):176.
[6]孙文歌 魏振方 江俊斌.IPv6链路本地地址安全技术研究[J].计算机技术与发展,2011,(10):237.
 SUN Wen-ge,WEI Zhen-fang,JIANG Jun-bin.Study of Link-Local Address Security in IPv6[J].,2011,(05):237.
[7]赵旭 秦雅娟.泛在绿色社区控制网络协议研究与分析[J].计算机技术与发展,2011,(12):13.
 ZHAO Xu,QIN Ya-juan.Study on Ubiquitous Green Community Control Network Protocol[J].,2011,(05):13.
[8]李园园 毕晓冬 张永胜 韩贝贝[].物联网框架安全威胁及相应策略研究[J].计算机技术与发展,2011,(12):148.
 LI Yuan-yuan,BI Xiao-dong,ZHANG Yong-sheng,et al.Framework and Security Threats on Internet of Things and Survey of Corresponding Strategies[J].,2011,(05):148.
[9]周天剑 王震 姚沁 许鸿锦.基于RFID盲人导航系统[J].计算机技术与发展,2011,(12):217.
 ZHOU Tian-jian,WANG Zhen,YAO Qin,et al.Blind Navigation System Based on RFID[J].,2011,(05):217.
[10]崔英 张宏科 秦雅娟 郑涛.基于IPv6无线传感器网络的室内照明控制系统[J].计算机技术与发展,2011,(12):230.
 CUI Ying,ZHANG Hong-ke,QIN Ya-jua,et al.Design and Implementation of Indoor Lighting Control System Based on IPv6 Wireless Sensor Network[J].,2011,(05):230.
[11]鄂旭[][],侯宝明[],毕佳娜[],等. 基于物联网的智能农业[J].计算机技术与发展,2014,24(09):164.
 E Xu[] [],HOU Bao-ming[],BI Jia-na[],et al. Smart Agriculture Based on Internet of Things[J].,2014,24(05):164.
[12]扈珊珊,李士宁,杨欢. 基于资源的物联网体系架构原型系统[J].计算机技术与发展,2014,24(10):16.
 HU Shan-shan,LI Shi-ning,YANG Huan. Prototype System of Architecture for Internet of Things Based on Resource[J].,2014,24(05):16.
[13]缪剑峰,管有庆. 轻量级IPv6邻居发现协议及在网关中的实现[J].计算机技术与发展,2014,24(10):58.
 MIAO Jian-feng,GUAN You-qing. Implementation of 6 LoWPAN Neighbor Discovery Protocol in Border Routers[J].,2014,24(05):58.
[14]暴建民[],汪凯[],暴晨奇[]. 基于USPIOT统一接口网络通信层的业务缓冲机制[J].计算机技术与发展,2014,24(10):93.
 BAO Jian-min[],WANG Kai[],BAO Chen-qi[]. A Service Buffering Mechanism Based on Unified Interface Network Communications Layer of USPIOT Platform[J].,2014,24(05):93.
[15]曹莹莹. 以信息智能处理技术为引导的智慧社区的构建[J].计算机技术与发展,2015,25(01):207.
 CAO Ying-ying. Building of Smart Communities Based on Intelligent Information Processing Technology[J].,2015,25(05):207.
[16]魏歌. 不同物联网架构的分层标准的研究[J].计算机技术与发展,2015,25(01):221.
 WEI Ge. Research on Hierarchical Standards on Different Architecture of IoT[J].,2015,25(05):221.
[17]赵震[],张龙昌[],韩汝军[]. 基于物联网的食品安全追溯研究[J].计算机技术与发展,2015,25(12):152.
 ZHAO Zhen[],ZHANG Long-chang[],HAN Ru-jun[]. Research on Food Safety Traceability Based on IoT[J].,2015,25(05):152.
[18]王晓明,张龙昌,栾斯乔,等. 物联网和融合环境区域食品安全云服务框架[J].计算机技术与发展,2016,26(04):123.
 WANG Xiao-ming,ZHANG Long-chang,LUAN Si-qiao,et al. Cloud Service Framework of Food Security under Internet of Things and Fusion Region[J].,2016,26(05):123.
[19]余雷,许宏科,胡欣. 基于物联网的远程视频监控系统设计[J].计算机技术与发展,2016,26(04):139.
 YU Lei,XU Hong-ke,HU Xin. Research on Long-distance Video Monitoring Based on Internet of Things[J].,2016,26(05):139.
[20]王晓明,张龙昌. 物联网融合环境食品安全云平台用户模型[J].计算机技术与发展,2016,26(06):158.
 WANG Xiao-ming,ZHANG Long-chang. Research on User Model of Food Security in Cloud Platform under Internet of Things and Fusion[J].,2016,26(05):158.

更新日期/Last Update: 2017-07-07