適用于物聯(lián)網(wǎng)應(yīng)用的密碼體制設(shè)計(jì)與分析
發(fā)布時間:2018-11-11 13:27
【摘要】:物聯(lián)網(wǎng)作為新一代信息技術(shù)的重要組成部分,能夠使物品與互聯(lián)網(wǎng)相連接進(jìn)行消息的通信,從而可以實(shí)現(xiàn)對物品的智能化識別、定位、追蹤、監(jiān)測與管理。無線傳感器網(wǎng)絡(luò)作為物聯(lián)網(wǎng)的一個重要組成部分,主要負(fù)責(zé)感知、收集信息并把所收集的信息傳送給服務(wù)器,服務(wù)器再對信息進(jìn)行分析和管理。物聯(lián)網(wǎng)是構(gòu)建智能社會的基本工具,但同時也具有很大的技術(shù)挑戰(zhàn),數(shù)據(jù)的安全性就是存在的問題之一。本論文主要對如何將無線傳感器收集到的數(shù)據(jù)安全地傳送給服務(wù)器進(jìn)行研究。無線傳感器網(wǎng)絡(luò)收集的數(shù)據(jù)如果在傳輸中被增加或刪除,就會影響服務(wù)器對數(shù)據(jù)的分析結(jié)果,甚至?xí)a(chǎn)生非常嚴(yán)重的后果,所以在無線傳感器網(wǎng)絡(luò)和服務(wù)器之間建立一個安全的通信信道是必要的。另一方面,傳感器節(jié)點(diǎn)具有通信能力有限、電源能量有限、計(jì)算處理能力和存儲能力有限的特點(diǎn),所以需要設(shè)計(jì)高效的算法來實(shí)現(xiàn)數(shù)據(jù)的機(jī)密性、完整性、認(rèn)證性和不可否認(rèn)性。本論文為了解決上述的問題,進(jìn)行了如下工作:(1)設(shè)計(jì)了一個異構(gòu)環(huán)簽密方案,該方案可以實(shí)現(xiàn)在一個邏輯步驟內(nèi)同時實(shí)現(xiàn)數(shù)據(jù)的機(jī)密性、完整性、認(rèn)證性、不可否認(rèn)性和匿名性。同時該方案允許傳感器節(jié)點(diǎn)使用基于身份的環(huán)境,而服務(wù)器使用基于公鑰基礎(chǔ)設(shè)施的環(huán)境。在隨機(jī)預(yù)言模型下,本文證明了該方案在適應(yīng)性選擇密文攻擊下具有不可區(qū)分性,且在適應(yīng)性選擇消息攻擊下具有存在不可偽造性。(2)設(shè)計(jì)了一個基于身份的組合公鑰密碼方案,該方案可以實(shí)現(xiàn)加密和簽名只使用一對公私鑰,對基于身份的公鑰密碼體制來說,可以大大降低身份信息數(shù)量,降低密鑰生成中心為用戶生成私鑰的成本。在隨機(jī)預(yù)言模型下,本文證明該方案在適應(yīng)性選擇密文和身份攻擊下具有不可區(qū)分性,在適應(yīng)性選擇消息和身份攻擊下具有存在不可偽造性。之后本文又利用該方案設(shè)計(jì)了一個用于傳感器節(jié)點(diǎn)和服務(wù)器之間通信的具有認(rèn)證性的保密協(xié)議。本學(xué)位論文設(shè)計(jì)的兩個方案都能同時實(shí)現(xiàn)數(shù)據(jù)的機(jī)密性、完整性、認(rèn)證性、不可否認(rèn)性。同時這兩個方案是根據(jù)物聯(lián)網(wǎng)的特點(diǎn)進(jìn)行設(shè)計(jì)的,所以這兩個方案適合解決物聯(lián)網(wǎng)中通信消息的安全問題。
[Abstract]:As an important part of the new generation of information technology, the Internet of things can make objects communicate with the Internet of information, so that the intelligent identification, location, tracking, monitoring and management of objects can be realized. As an important part of the Internet of things, wireless sensor networks are mainly responsible for sensing, collecting information and transmitting the collected information to the server, which then analyzes and manages the information. The Internet of things is a basic tool for building an intelligent society, but it also has great technical challenges. The security of data is one of the problems. This thesis mainly studies how to transfer the data collected by wireless sensor to server safely. If the data collected by wireless sensor network is added or deleted in transmission, it will affect the result of the server's analysis of the data, and even have very serious consequences. So it is necessary to establish a secure communication channel between wireless sensor network and server. On the other hand, sensor nodes have the characteristics of limited communication capacity, limited power supply energy, limited computing and processing capacity and limited storage capacity, so it is necessary to design efficient algorithms to realize the confidentiality and integrity of data. Authentication and non-repudiation. In order to solve the above problems, the following work has been done in this paper: (1) A heterogeneous ring signcryption scheme is designed, which can realize the confidentiality, integrity and authentication of data simultaneously in a logical step. Undeniable and anonymous. At the same time, the scheme allows sensor nodes to use identity-based environments, while servers use public key infrastructure environments. In the stochastic prophecy model, it is proved that the scheme is indistinguishable under adaptive ciphertext attack. Under adaptive selection message attack, there is unforgeability. (2) an identity-based combined public key cryptosystem is designed, which can encrypt and sign only a pair of public and private keys. For identity-based public key cryptosystems, the amount of identity information can be greatly reduced, and the cost of generating private keys for users by key generation centers can be reduced. Under the stochastic prophecy model, it is proved that the scheme is indistinguishable under adaptive selection ciphertext and identity attack, and unforgeable under adaptive selection message and identity attack. Then this paper designs an authentication protocol for communication between sensor nodes and servers. The two schemes designed in this dissertation can realize the confidentiality, integrity, authentication and non-repudiation of the data simultaneously. At the same time, these two schemes are designed according to the characteristics of the Internet of things, so these two schemes are suitable to solve the security problem of communication messages in the Internet of things.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2016
【分類號】:TP391.44;TN929.5;TN918.1
[Abstract]:As an important part of the new generation of information technology, the Internet of things can make objects communicate with the Internet of information, so that the intelligent identification, location, tracking, monitoring and management of objects can be realized. As an important part of the Internet of things, wireless sensor networks are mainly responsible for sensing, collecting information and transmitting the collected information to the server, which then analyzes and manages the information. The Internet of things is a basic tool for building an intelligent society, but it also has great technical challenges. The security of data is one of the problems. This thesis mainly studies how to transfer the data collected by wireless sensor to server safely. If the data collected by wireless sensor network is added or deleted in transmission, it will affect the result of the server's analysis of the data, and even have very serious consequences. So it is necessary to establish a secure communication channel between wireless sensor network and server. On the other hand, sensor nodes have the characteristics of limited communication capacity, limited power supply energy, limited computing and processing capacity and limited storage capacity, so it is necessary to design efficient algorithms to realize the confidentiality and integrity of data. Authentication and non-repudiation. In order to solve the above problems, the following work has been done in this paper: (1) A heterogeneous ring signcryption scheme is designed, which can realize the confidentiality, integrity and authentication of data simultaneously in a logical step. Undeniable and anonymous. At the same time, the scheme allows sensor nodes to use identity-based environments, while servers use public key infrastructure environments. In the stochastic prophecy model, it is proved that the scheme is indistinguishable under adaptive ciphertext attack. Under adaptive selection message attack, there is unforgeability. (2) an identity-based combined public key cryptosystem is designed, which can encrypt and sign only a pair of public and private keys. For identity-based public key cryptosystems, the amount of identity information can be greatly reduced, and the cost of generating private keys for users by key generation centers can be reduced. Under the stochastic prophecy model, it is proved that the scheme is indistinguishable under adaptive selection ciphertext and identity attack, and unforgeable under adaptive selection message and identity attack. Then this paper designs an authentication protocol for communication between sensor nodes and servers. The two schemes designed in this dissertation can realize the confidentiality, integrity, authentication and non-repudiation of the data simultaneously. At the same time, these two schemes are designed according to the characteristics of the Internet of things, so these two schemes are suitable to solve the security problem of communication messages in the Internet of things.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2016
【分類號】:TP391.44;TN929.5;TN918.1
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 秦茜;;物聯(lián)網(wǎng)驟成產(chǎn)業(yè)巨浪 各方大肆追捧恐為時尚早[J];IT時代周刊;2009年Z2期
2 石菲;;物聯(lián)網(wǎng)還有多遠(yuǎn)[J];中國計(jì)算機(jī)用戶;2009年Z2期
3 馬繼華;韓文哲;;物聯(lián)網(wǎng)的未來會變成“空中樓閣”嗎?[J];信息網(wǎng)絡(luò);2009年10期
4 ;物聯(lián)網(wǎng)系列報(bào)道之一 理性物聯(lián)網(wǎng)[J];通信世界;2009年40期
5 李鵬;;物聯(lián)網(wǎng)發(fā)展 標(biāo)準(zhǔn)與應(yīng)用先行[J];通信世界;2009年40期
6 李鵬;趙經(jīng)緯;;北郵謝東亮 物聯(lián)網(wǎng)需兩顆紅心一種準(zhǔn)備[J];通信世界;2009年40期
7 周雙陽;;尋找物聯(lián)網(wǎng)的制高點(diǎn)[J];通信世界;2009年41期
8 張鵬;;物聯(lián)網(wǎng),十年涅i,
本文編號:2324968
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2324968.html
最近更新
教材專著