期刊文献+

基于PUF的低开销物联网安全通信方案 被引量:12

A PUF-Based Low Cost Secure Communication Scheme for IoT
下载PDF
导出
摘要 将物理不可克隆函数(Physical Unclonable Function,PUF)与椭圆曲线上的无证书公钥密码体制相结合,提出一种面向物联网的安全通信方案,在节点设备不存储任何秘密参数的情况下,实现设备间消息的安全传递.方案无需使用高计算复杂度的双线性对运算,并提供了消息认证机制.安全性分析表明,该方案不仅能够抵抗窃听、篡改、重放等传统攻击,而且可以有效防范节点设备可能遭到的复制攻击.对比结果显示,相较于同类方案,该方案明显降低了设备的资源开销. By combining the Physical Unclonable Function(PUF) with the certificateless public key cryptosystem on the elliptic curve,a secure communication scheme for IoT is proposed.The secure transmission of messages is realized on the condition of node devices not storing any secret parameters.The proposed scheme eliminates the need for bilinear pairing whose computing complexity is high and provides a message authentication mechanism.Security analysis demonstrates that the scheme can not only resist the traditional attacks such as eavesdropping,tampering and replay,but also protect the node device from replication attacks.Compared with related schemes,the proposed scheme obviously decreases the resource overhead of devices.
作者 李森森 黄一才 郁滨 鲍博武 LI Sen-sen;HUANG Yi-cai;YU Bin;BAO Bo-wu(Information Engineering University,Zhengzhou,Henan 450001,China)
机构地区 信息工程大学
出处 《电子学报》 EI CAS CSCD 北大核心 2019年第4期812-817,共6页 Acta Electronica Sinica
基金 国防信息保障技术重点实验室开放基金(No.KJ-15-104)
关键词 物联网 物理不可克隆函数 椭圆曲线密码 安全通信 消息认证 Internet of Things Physical Unclonable Function(PUF) elliptic curve cryptosystem secure communication message authentication
  • 相关文献

参考文献2

二级参考文献19

  • 1Akyildiz F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002, 38(4) : 393-422
  • 2Deng J, Han R, Mishra S. INSENS: Intrusion-tolerant routing in wireless sensor networks//Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS). Providence, Rhode Island, USA, 2003: 32-39
  • 3Lazos L, Poovendran R. SeRLoc: Secure range-independent localization for wireless sensor networks//Proceedings of the ACM Workshop on Wireless Security (WISE). Philadelphia, PA, USA, 2004:21-30
  • 4Przydatek B, Song D, Perrig A. SIA.. Secure information aggregation in sensor networks//Proceedings of the 1st Inter- national Conference on Embedded Networked Sensor Systems. California, USA, 2003:255-265
  • 5Crossbow Technology, Inc. MICA2: Wireless measurement system.
  • 6Koc K C. High-speed RSA implementation. RSA Laboratories: Technical Report TR201, 1994
  • 7Neuman B C, Tso T. Kerberos: An authentication service for computer networks. IEEE Communications, 1994, 32 (9) : 33-38
  • 8Chan H, Perrig A, PIKE: Peer intermediaries for key establishment in sensor networks//Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). Miami, FL, USA, 2005:524-535
  • 9Carntepe S A, Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks//Proceedings of the Computer Security ESORICS. Sophia Antipolis, French Riviera, France, 2004:293-308
  • 10Eschenauer L, Gligor V. A key management scheme for distributed sensor networks//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington, USA, 2002:41-47

共引文献37

同被引文献87

引证文献12

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部