Dissertation > Excellent graduate degree dissertation topics show

Research and Application on Security Authentication Technologies in Internet of Things

Author: MaWenJie
Tutor: ShiBing;HongZhiMin
School: Shandong University
Course: Computer technology
Keywords: information security cryptography Internet of things security authentication authenticated key exchange protocol
CLC: TN929.5
Type: Master's thesis
Year: 2011
Downloads: 431
Quote: 0
Read: Download Dissertation

Abstract


With the development of computers and Internet, the concept of the internet of things came into being, which brought great opportunities and challenges to our informationalized life. Internet of things is a worldwide network which based on mass micro-devices, using the new generation as the backbone, and will be used in traditional and emerging industries. It will be another wave of the global information technology industry, following the computer, internet and mobile communication networks, which will bring great opportunities and challenges to the high-speed information life. Accordingly, the security problem, especially authentication problem, the foundation of the running of the whole Internet of things, is one of the key issues in the present study which has a very important practical significance.According to the analysis of the Internet of things’ structure and authentication protocols, we research the authentication of the Internet of things. In summary, we discuss the authentication problem between server and node, node and terminal, and terminal and terminal. The innovation points of this paper are as follows:(1) An authenticated key exchange protocol based on the public key cryptosystem is proposed, which can solve the security communication problem between server and node. This protocol can be used for designing the middle devices of secure hub, sensor gateway, RFID sensor. In the process of using these devices, In addition to traditional Internet capabilities,it is also able to correctly perform authentication and key agreement protocols with the server, transmiting data safely.(2) In view of the terminals’ shortcomings of low memory and computing power in the Internet of things, an efficient mutual password authentication protocol is presented.We implement an entrance guard system in the Internet of things under the environment of FPGA, so that the security features of the protocol has been verified. Meanwhile,this protocol can also be used in networking devices of medical, environmental monitoring, smart home and other areas.(3) We propose a point-to-point authentication and security communication protocol, which can make up the shortcoming of conventional p2p authentication. Through simulation and testing by a variety of tools, the whole program reached the expected safety results efficiently.Our work solves the problems in similar products, such as too simple design of remote control, easy to copy, the key can not be modified, and inconvenient to carry.Actually, the safety issue of the internet of things is very broad, which has a large number of technical problems to be resolved. We researched only part of the key authentication technology, including the safety certifucation issues between the server and node, the node and terminal, and the terminal and terminal in summary. This paper put forward new authentication protocols for various security models, which were obtained through the in-depth analysis of a variety security needs of the internet of things.

Related Dissertations

  1. Resrarch on Multisignatures and Multisigncryptions from Identity-based,TN918.1
  2. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  3. Research on Iris Based Cryptography,TP309.7
  4. The Internet of Things Applied Research in Clothing Industry,TN929.5
  5. Study on Strategy of Our National Confidential E-government Nets’ Information Security Construction,D630
  6. Short-Range Wireless Localization Algorithms for Internet of Things,TN929.5
  7. Research and Design on Asymmetric Encryption and Decryption Algorithm Based on FFTT,TP309.7
  8. Study on Information Security of C Company,F270.7
  9. Study on Information Management Security and Countermeasures of A Power Supply Company,F426.61
  10. Digital Information Resources System Security Risk Assessment,G353.1
  11. The BW Internet of Things Development Strategy,F49
  12. Design and Implementation of the online bidding system for information security,TP393.08
  13. Research and Implementation of IOT Service Model Description Language,TN929.5
  14. Intrusion Detection in Mobile Ad Hoc Networks: A Timed Finite State Machines Approach,TN929.5
  15. Research and Implementation of Information Security Strategy in Electric Enterprises,TP393.08
  16. Reliability and Security Study of the Digital Substation System,TM732
  17. The Research and Implementation of EPC Information Service System,TN929.5
  18. Design of Smart Home System Based on Internet of Things Technology,TN929.5
  19. Application Research on Network Gateway for IOT,TN929.5
  20. Research on Directional High Gainantennaapplied in the Internet of Things,TN820

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Wireless communications > Mobile Communications
© 2012 www.DissertationTopic.Net  Mobile