天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

用于物聯(lián)網(wǎng)智能設(shè)備之間安全通信的輕量級(jí)數(shù)字簽名方法研究

發(fā)布時(shí)間:2021-04-17 04:29
  物聯(lián)網(wǎng)中的很多智能設(shè)備可以通過(guò)網(wǎng)絡(luò)完成在線信息交互。對(duì)于醫(yī)療健康來(lái)說(shuō),智能設(shè)備可以監(jiān)測(cè)健康數(shù)據(jù)并將其存儲(chǔ)在數(shù)據(jù)庫(kù)中。與此同時(shí),傳輸信息的安全成為數(shù)據(jù)傳輸和接收過(guò)程中必須解決的問(wèn)題。為了防止他人惡意攻擊,需要在特定安全強(qiáng)度下,對(duì)智能設(shè)備中的簽名方案設(shè)計(jì)更加輕量級(jí)的操作以保證通信安全。為了解決大量數(shù)據(jù)簽名和驗(yàn)證過(guò)程中計(jì)算開(kāi)銷(xiāo)過(guò)大的問(wèn)題,本文使用更簡(jiǎn)潔的操作來(lái)實(shí)現(xiàn)簽名和驗(yàn)證,同時(shí)使用簡(jiǎn)化的復(fù)雜數(shù)字簽名算法來(lái)保障物聯(lián)網(wǎng)中智能設(shè)備間的通信安全。此外,本文還提出了多選項(xiàng)參數(shù)選擇方法,該方法利用不同簽名作為每個(gè)文檔關(guān)鍵級(jí)別的特殊索引表達(dá)上的簽名驗(yàn)證對(duì),并且可通過(guò)增強(qiáng)安全強(qiáng)度來(lái)抵抗流量分析攻擊。本文提出一種基于物理不可克隆函數(shù)(PUF)的安全方案,利用IC創(chuàng)建過(guò)程中產(chǎn)生的隨機(jī)因素生成各種不匹配,唯一且不同的挑戰(zhàn)-應(yīng)答對(duì),將其存儲(chǔ)在數(shù)據(jù)庫(kù)中,用于物聯(lián)網(wǎng)中智能設(shè)備之間的安全關(guān)聯(lián);趦(nèi)存和模擬電子的PUF大多被用來(lái)提供可靠的安全屬性,其中基于MOS晶體管的PUF,由于其尺寸較小,在運(yùn)行中會(huì)存在各種各樣的失配問(wèn)題。針對(duì)此類(lèi)問(wèn)題,本文設(shè)計(jì)了基于PUF的身份認(rèn)證方案,模擬會(huì)話密鑰以確保物聯(lián)網(wǎng)智能設(shè)備之間的信息交... 

【文章來(lái)源】:北京科技大學(xué)北京市 211工程院校 教育部直屬院校

【文章頁(yè)數(shù)】:133 頁(yè)

【學(xué)位級(jí)別】:博士

【文章目錄】:
致謝
摘要
Abstract
LIST OF NOTATIONS
LIST OF ABBREVIATIONS
CHAPTER 1 INTRODUCTION
    1.1 INTERNET OF THINGS (IOT)
    1.2 APPLICATIONS OF IOT
        1.2.1 Smart Sensing
        1.2.2 Radio-Frequency Identification (RFID)
        1.2.3 Smart Devices Network
        1.2.4 Smart Healthcare
        1.2.5 Smart Life and Society
    1.3 BACKGROUND OF RESEARCH
    1.4 OBJECTIVES
    1.5 CONTRIBUTIONS OF RESEARCH
    1.6 THESIS STRUCTURE
CHAPTER 2 LITERATURE REVIEW
    2.1 INTERNET OF THINGS AND DIGITAL SIGNATURES
    2.2 RFID TECHNOLOGY AND INTERNET OF THINGS
    2.3 PHYSICAL UNCLONABE FUNCTION BASED AUTHENTICATION AND KEY GENERATION
    2.4 DIGITAL SIGNATURE BASED SCHEMES
        2.4.1 Key Distribution and Signature Schemes based on DLP
        2.4.2 Key Distribution and Signature Schemes based on IFP
        2.4.3 Signature Schemes based on Combination of IFP and DLP
        2.4.4 Key Distribution and Signature Schemes based on IFP
        2.4.5 More Key Distribution and Signature Schemes
    2.5 LOGICAL TREE BASED KEY ESTABLISHMENT SCHEMES
    2.6 PROBLEM IDENTIFICATION
        2.6.1 Problem 1: Complex and Costly Digital Signatures
        2.6.2 Problem 2: Clonablity forAuthentication
        2.6.3 Problem 3: Mobility based Unnecessary Rekeying
CHAPTER 3 LIGHTWEIGHT DIGITAL SIGNATURE BASED SECURITY SCHEME
    3.1 SHORTENED COMPLEX DIGITAL SIGNATURE ALGORITHM
    3.2 SCDSA-SIGNATURE AND VERIFICATION PROCESSES
        3.2.1 Basic Parameters
        3.2.2 Key Generation
        3.2.3 Signature Process
        3.2.4 Verification Process
    3.3 Multi-option Parameter Selection(MPS-SCDSA)
    3.4 Formal Modeling and Analysis of SCDSA
    3.5 Results and Analysis
        3.5.1 Security Analysis
        3.5.2 Time Consumption for Signature Operation
        3.5.3 Verification Time Consumption
        3.5.4 Verification Time for Message Length Variations
        3.5.5 Communication Overhead
        3.5.6 Resilience
    3.6 SUMMARY
CHAPTER 4 PHYSICAL UNCLONABLE FUNCTION BASED AUTHENTICATION SCHEME FOR SMARTDEVICES IN IOT
    4.1 INTRODUCTION
    4.2 PUF BASED AUTHENTICATION SCHEME(PAS)
    4.3 REGISTRATION AND AUTHENTICATION PHASE
    4.4 SECURE COMMAND EXECUTION PROTOCOL
    4.5 RESULTS AND ANALYSIS
    4.6 SUMMARY
CHAPTER 5 LOGICAL TREE BASED SECURE REKEYING MANAGEMENT FOR SMART DEVICESGROUPS IN IOT ENABLED WSN
    5.1 INTRODUCTION
    5.2 SYSTEM MODEL FOR MULTICASTING MESSAGES
    5.3 GROUP DEPLOYMENT
    5.4 NEW NODE JOINING PROTOCOL
    5.5 NODE MIGRATION PROTOCOL
    5.6 FORMAL MODELING AND ANALYSIS
    5.7 RESULTS AND ANALYSIS
        5.7.1 Message Exchange Analysis
        5.7.2 Energy Utilization
        5.7.3 Rekeying
        5.7.4 Resilience
    5.8 SUMMARY
CHAPTER 6 CONCLUSION
BIBLIOGRAPHY
作者簡(jiǎn)歷及在學(xué)研究成果
學(xué)位論文數(shù)據(jù)集


【參考文獻(xiàn)】:
期刊論文
[1]A Quantized Kernel Least Mean Square Scheme with Entropy-Guided Learning for Intelligent Data Analysis[J]. Xiong Luo,Jing Deng,Ji Liu,Weiping Wang,Xiaojuan Ban,Jenq-Haur Wang.  中國(guó)通信. 2017(07)



本文編號(hào):3142811

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/shengwushengchang/3142811.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶(hù)0150a***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com