论文部分内容阅读
物联网包含感知子网和传输骨干网,其感知子网中节点能力受限,往往利用移动的传感器节点跨区域访问来获取信息;而其传输骨干网络需要依托现有Internet的基础设施,并利用其提供的强大服务.在这种情况下,移动节点的漫游带来了新的安全问题,一方面移动节点在感知子网间跨区域漫游,虽和MANET中一样需要保证移动节点漫游时高效安全地加入新的拜访域,但因传感节点资源极端受限而对轻量级有更高数量级的要求;另一方面资源受限的感知子网间移动节点漫游仅能提供轻量级安全,但是在接入骨干传输网时,不可因此降低骨干网络已有的安全性,即轻量级的安全协议和传统骨干网协议综合运用时,需具有组合安全性.本文针对这种基于骨干传输网的移动节点漫游问题,提出了一个新的随机漫游认证协议(RMRAP),兼顾安全性和实际应用的可行性,实现了漫游的轻量级身份认证,保护了漫游节点的隐私,同时实现了具有前向安全性,会话密钥对;并针对衔接骨干网和感知子网的基站进行了组合安全性的认证测试,验证了RMRAP的安全性;最后,从理论分析和实验仿真两个方面,分析了RMRAP协议的性能,并和相近工作进行了对比,对比表明,具有组合安全性的RMRAP在计算、通信开销方面,依然具有和同类协议可比较的相近性能.
The Internet of Things (IoT) includes a perceptual subnet and a transport backbone, and its perceived subnetwork has limited capabilities of nodes, and often uses mobile sensor nodes to obtain information through interregional access. Its transport backbone network needs to rely on the existing Internet infrastructure and utilize In this case, mobile node roaming brings new security issues. On the one hand, mobile nodes roam across sensing subnets, and as MANET needs to ensure efficient and safe mobile node roaming To join the new visit to the region, but due to extremely restricted sensor nodes and lightweight requirements of a higher order of magnitude; on the other hand limited resource-aware mobile nodes roaming between subnets can only provide lightweight security, However, access to the backbone transport network, the backbone network can not therefore reduce the existing security, that light-weight security protocols and traditional backbone network protocol integrated use, the need for a combination of security.This paper is based on the backbone transport network , This paper proposes a new random roaming authentication protocol (RMRAP), taking into account the security and practical feasibility of the roaming, Authentication and protection of the privacy of roaming nodes at the same time to achieve a forward-security, session key pair; and for the convergence of the backbone network and the perceived sub-base station security testing combined to verify the safety of RMRAP; Finally, from the theoretical analysis and experimental simulation, the performance of the RMRAP protocol is analyzed and compared with the similar work. The comparison shows that the RMRAP with combined security still has the similarities with the similar protocols in terms of computing and communication overhead Similar performance.