An authenticated key agreement protocol with unbalanced computing costs for resource—limited devices

来源 :科学与财富 | 被引量 : 0次 | 上传用户:a394665234
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  摘 要:The Internet of Things (IoT) is a fast-growing industry that is bound to transform homes, cities and factories. Due to its broad influence in our life, IoT has grown exponentially in the last decade and appealed to researchers. Nowadays, during its rapid growth, IoT is facing with several challenges, of which the security issue is one of the biggest one. In this paper, we design a protocol with the help of Elliptic Curve Cryptography (ECC) to secure messages exchange. This protocol reduces the computational cost on the sensor node through transferring some heavy computing tasks to the coordinator. Finally, the implementation details of the protocol are presented.
  關键词:Internet of Things, Elliptic curve cryptography, authenticated key agreement.
  I. INTRODUCTION
  The Internet of things (IoT) is a new stage in the development of ubiquitous networks. Although IoT develops rapidly, it is inevitably associated with security issues. Especially in low-powerful nodes. In terms of [1], small sensor nodes with the less processing capacity are applied in IoT increasingly. Meanwhile, Fadi et al. [2] notices the limitation in battery life, storage space and processing power of resource-limited sensor nodes. [3] points out that an adversary can impersonate the initiator, responder or initiate the man-in-the-middle attack. The initiator and responder have a false impression that they have a shared key. Nevertheless, each of them has a shared key with the attacker. Because of this, the communication security is vulnerable [4]. Furthermore, due to the limited battery and the limited processing power of sensor nodes, the computational burdens of sensors must be reduced [5].
  This paper aims to secure the communication between sensor node and coordinator. Based on it, one security protocol is designed by using ECC algorithm. In our design, IoT establishes a secure link for Raspberry Pi and Laptop through this protocol.
  II.IMPLEMENTATION
  In this section, we carry out a set of experiments for the protocol to test the performance and system. These experiments were performed on Raspberry pi and PC. The HMAC function used for the experiments is SHA256. Five elliptic curves i.e. Curve P-192, P-224, P-256, P-384, P-521 are employed in our experiment. The PC is used as the monitor of Raspberry pi. We verify whether our protocol is useful when we carry them on the PC and Raspberry pi.
  We run these five curves for ten times with each of them. Additionally, in order to observe the runtime of both sides more clearly, the average runtime of each elliptic curve is computed as shown in table 1:   According to the table 1, the runtime of the side on the sensor node is shorter than the runtime of the side on the coordinator. Therefore, we believe that shift the computational burden from sensor node to the coordinator is efficient to low-powerful sensors.
  III.CONCLUSION
  In this thesis, an improved protocol of IEEE 802.15.6 displayed authenticated association is designed. Our protocol realized the following aims of design: 1) Secure the communication between coordinator and sensor node. 2) Reduce the computing costs of the sensor node by shifting computational burden from sensor node to coordinator.
  In the future, we plan to build a stronger network with other algorithms and add more sensor nodes to test our protocol.
  REFERENCES
  [1]Xue, N., Liang, L., Zhang, J., & Huang, X. (2016, June). An access control system for intelligent buildings. In Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications (pp. 11-17). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
  [2]Hamad, F., Smalov, L., & James, A. (2009). Energy-aware Security in M-Commerce and the Internet of Things. IETE Technical review, 26(5), 357-362.
  [3]Huang, X., Liu, D., & Zhang, J. (2015, November). An improved IEEE 802.15. 6 password authenticated association protocol. In Communications in China (ICCC), 2015 IEEE/CIC International Conference on (pp. 1-5). IEEE.
  [4]Zhang, J., Xue, N., & Huang, X. (2016). A Secure System for Pervasive Social Network-Based Healthcare. IEEE Access, 4, 9239-9250.
  [5]Zhang, J., Huang, X., Craig, P., Marshall, A., & Liu, D. (2016). An improved protocol for the password authenticated association of IEEE 802.15. 6 standard that alleviates computational burden on the node. Symmetry, 8(11), 131..
其他文献
摘要:现浇混凝土楼板与预制混凝土楼板相比具有整体抗震性能好的优点。但是,在施工过程中,如果处理不当,容易出现楼板裂缝问题,既不美观,又影响使用,应当引起设计和施工人员的重视。本文从现浇楼板裂缝产生入手,分析了裂缝产生原因,并从各方面总结了现浇楼板裂缝的治理措施,以减少楼板裂缝的产生,提高建筑物施工质量。  关键词:楼板裂缝,产生原因,治理措施  前言:随着建筑工程行业的逐渐发展,楼板的结构形式在建
期刊
摘要:随着信息化的发展以及“互联网+”时代的到来,软件产业稳步增长,人才需求迫切,然而地方高校在培养软件工程专业人才方面存在诸多不足。我校在“互联网+”背景下,积极探索与实践软件工程人才培养模式,为其他高校提供借鉴。  关键字:互联网+;软件工程;人才培养  一、“互联网+”背景下软件产业的发展及对人才的需求  21世纪以来,信息化进程不断向前推进,作为经济信息化基础的软件产业受到全球各个国家的高
期刊
摘要:为了降低大气污染,寻求更加合理的烟气粉尘处理方式,提高除尘效率,降低建设成本和运行成本,结合目前企业除尘方式,提出电袋复合除尘器的应用途径。产生良好的社会公共效益同时,为企业创造更多的经济效益。  关键词:电袋复合;除尘;应用  引言  根据当前国家环保治理的形势,环保部于执行新标准,《大气污染物排放标准》中对于大气污染排放限值提高,烟尘排放由原来的50 mg/m3限制到30 mg/m3,在
期刊
摘 要:路面路基的建设始终是公路修建过程中的重要部分,对路面路基的施工的质量直接决定了公路的使用年限。本文阐述在公路路面施工之前的准备工作,依据准备工作中需要注意的事项,探究公路路面基层施工中的水泥稳定碎石技术。  关键词:公路路面;基层施工;稳定碎石;混合料  引言  我国的经济发展带动了公路的建设速度,即使如此公路的交通的压力还是越来越大,为了合理有效地增加公路的使用年限,我们应该对公路路面基
期刊
摘要:集控系统本着集中管理、分散控制的设计理念,采用了分層阶梯型的“金字塔形”控制结构,实现了火电厂控制系统的集约化及自动化,有效提升发电机组的运行效率。本文对此进行了分析研究。  关键词:发电厂;集控运行;技术;应用;问题;研究  与传统发电厂所应用的单独控制系统不同,集散控制系统(Distributed Control System,以下简称为集控系统)本着集中管理、分散控制的设计理念,采用了
期刊
摘 要:随着社会的发展,科技也在不断的进步。其中锅炉也发生了翻天覆地的变化,已经从原本的单纯供暖设备变成了特殊设备。在这种情况下,锅炉的制造监督检验就显得非常重要,如果质量不合格的锅炉付诸使用,就很容易造成巨大的灾难。本文就通过对锅炉制造监督检验中的常见问题进行分析,来得出如何保证锅炉出产的质量。  关键词:锅炉制造;监督检验;焊接质量控制;无损检测;水压试验  1 概述  在当前来看,锅炉已经成
期刊
摘 要:轧钢厂作为钢铁产业的最后一环,其安全稳定的运转对提高钢铁产量,增大经济效益具有重要意义。因此,本文建立了基于模糊层次分析法和集对分析理论的轧钢安全态势评价模型,首先建立轧钢厂安全评价指标体系,然后基于模糊层次分析法得到12项指标的权重大小,借助集对分析理论,进行同、异、反分析,得到该轧钢厂的安全等级为Ⅱ级,最后针对安全评价水平与Ⅱ级安全标准的集对势分析,得到二者存在强烈的同一变化趋势。  
期刊
摘 要:在社会经济不断发展的过程中,我国各地的拍卖行业也取得了极大的进步与发展,其业务范围已经覆盖了社会的方方面面。新形势下,拍卖企业如何推进转型升级和创新发展,本文就现存于拍卖市场发展中的问题进行分析,并提出一些优化发展的建议。  关键词:拍卖市场;发展;问题与建议  “拍卖”属于一种交易方式,是以公开竞价的形式将特定物品或者财产权利转让给最高应价者的买卖方式,相比于其他资源配置机制其在显示市场
期刊
为深入推进依法自主办学,不断深化现代学校制度改革,今年以来,我市提早谋划,积极探索,找准依法自主办学工作的突破口,采取多项创新举措,深化管办评改革,实现了我市依法自主办学工作新局面。  一、背景与起因  2015年《教育部关于深入推进教育管办评分离促进政府职能转变的若干意见》中指出“推进管办评分离,构建政府、学校、社会之间新型关系,是全面深化教育领域综合改革的重要内容,是全面推进依法治教的必然要求
期刊
摘 要:随着主力油藏进一步开发,地下油藏内部油水关系分布更加复杂,迫切需要三维地质建模和油藏数值模拟提供更为有力的技术支持。通过建立精细三维地质模型为数值模拟提供基础数据,用数值模拟确定小层剩余油分布、注入水状况及剩余油丰度分布情况,结合油藏开采动态,针对剩余油的状况进一步对各小层的剩余油进行挖潜改造,使"两个递减"得到较好控制,从而夯实油田稳产基础。  关键词:建模数模 油砂体 剩余油  一、油
期刊