首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一种基于椭圆曲线的物联网双向身份认证协议
引用本文:张心艺,宋建涛,杜 杨.一种基于椭圆曲线的物联网双向身份认证协议[J].教育技术导刊,2009,19(10):233-237.
作者姓名:张心艺  宋建涛  杜 杨
作者单位:北京工业大学 信息学部,北京 100124
摘    要:身份认证是物联网安全可信的第一道防线,是保障感知网络稳定运行的基石。基于感知节点的安全性需求及有限的计算能力,提出一种基于椭圆曲线的双向身份认证协议。该方案能够认证通信感知节点双方身份的真实性,加解密所需密钥信息量少,且不存在密钥协商问题。为解决认证延迟和能量消耗问题,实现簇头节点对同一群组内感知节点的批身份认证,对可疑节点基于二分搜索技术实现身份追踪,快速定位可疑节点位置,及时甄别不可信节点。安全性分析表明,该机制具有正确性、匿名性、不可抵抗性,可有效阻止恶意节点窃取及篡改感知数据。

关 键 词:物联网  身份认证  双向身份认证  批认证  
收稿时间:2020-02-21

A Bi-directional Identity Authentication Protocol of Internet of Things Based on Elliptic Curve
ZHANG Xin-yi,SONG Jian-tao,DU Yang.A Bi-directional Identity Authentication Protocol of Internet of Things Based on Elliptic Curve[J].Introduction of Educational Technology,2009,19(10):233-237.
Authors:ZHANG Xin-yi  SONG Jian-tao  DU Yang
Institution:Information Faculty, Beijing University of Technology, Beijing 100124,China
Abstract:Identity authentication is the first line of defense for the security of the Internet of Things, and the cornerstone to ensure the stable operation of perceptual network. Based on the security requirements of the sensing node and its limited computing power, this paper proposes a two-way identity authentication protocol based on elliptic curve. This scheme can authenticate the identity of both sides of the sensing nodes. The amount of key information needed for encryption and decryption is small, and there is no key negotiation problem. Subsequently, in order to solve the problem of authentication delay and energy consumption, based on two-way identity authentication protocol, the cluster head node’s batch identity authentication mechanism for sensing nodes in the same group is proposed. This mechanism can locate the suspicious nodes quickly and identify the untrusted nodes in time. The security analysis shows that the mechanism is correct, anonymous, and irresistible, and can effectively prevent malicious nodes from stealing and tampering with sensing data.
Keywords:Internet of Things  identity authentication  bi-directional identity authentication  batch authentication  
点击此处可从《教育技术导刊》浏览原始摘要信息
点击此处可从《教育技术导刊》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号