期刊文献+

物联网认证协议综述 被引量:5

A Survey on Authentication Protocols for Internet of Things
下载PDF
导出
摘要 物联网设备数量的大规模增长以及人工智能技术的逐步升级给物联网安全带来了严峻的挑战.由于大部分物联网设备具有无键盘输入、CPU结构简单、存储容量小、计算和通信能力弱等特点,以及物联网网络的体系结构和计算机网络的不同,传统的认证协议无法在物联网环境中通用.因此,设计适用于物联网环境的认证协议是保证物联网安全必不可少的环节.本文介绍了物联网认证协议研究的背景以及近几年物联网认证协议的研究进展,分析了物联网认证协议与传统计算机网络认证协议的不同,指出了物联网认证协议中常用的技术和数学方法,包括椭圆曲线加密、秘密共享、量子密码学等,然后从用户与设备认证、设备与服务器认证、设备与设备认证三个方面来介绍物联网认证协议研究的最新研究成果,最后讨论了物联网认证协议未来研究方向. The large-scale growth of the number of devices in the Internet of Things and the gradual improvement of artificial intelligence technology have brought severe challenges to the security of the Internet of Things.Due to the fact that most devices in Internet of Things have no keyboard input,simple CPU structure,small storage capacity,weak computing,and communication capacity,and due to the difference between the Internet of Things network and computer network,so traditional authentication protocols are not suitable in the Internet of Things environment.Therefore,designing an authentication protocol for the Internet of Things is an essential part of ensuring the security of the Internet of Things.This survey introduces the background of Internet of Things authentication protocols and the relevant research progress in recent years,then analyzes the differences between Internet of Things authentication protocols and traditional computer network authentication protocols.The techniques and mathematical methods commonly used in Internet of Things authentication protocols(e.g.Elliptic curve encryption,Secret sharing,Quantum cryptography and so on)are summarized.The state-of-the-art research results of Internet of Things authentication protocols are described from three aspects:user and device authentication,device and server authentication,device and device authentication.Some future research directions are also discussed.
作者 杨婷 张光华 刘玲 张玉清 YANG Ting;ZHANG Guang-Hua;LIU Ling;ZHANG Yu-Qing(College of Information Science and Engineering,Hebei University of Science and Technology,Shijiazhuang 050018,China;School of Cyber Engineering,Xidian University,Xi’an 710071,China;National Computer Network Intrusion Protection Center,University of Chinese Academy of Sciences,Beijing 101408,China)
出处 《密码学报》 CSCD 2020年第1期87-101,共15页 Journal of Cryptologic Research
基金 河北省高等学校科学研究计划项目(ZD2018236) 国家自然科学基金(U1836210,61572460)。
关键词 物联网 认证协议 物联网云平台安全 Internet of Things authentication protocol IoT platform security
  • 相关文献

参考文献3

二级参考文献21

  • 1Beresford, Alastair R.,Stajano, Frank.Location privacy in pervasive computing. IEEE Pervasive Computing . 2003
  • 2Bellovin S M,Merritt M.Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1992
  • 3Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-EUROCRYPT’03 . 2003
  • 4Rolf H. Weber.Internet of Things – New security and privacy challenges[J]. Computer Law and Security Review: The International Journal of Technology and Practice . 2010 (1)
  • 5Benjamin Fabian,Oliver Günther.Security challenges of the EPCglobal network[J]. Communications of the ACM . 2009 (7)
  • 6Dibyendu Chakrabarti,Subhamoy Maitra,Bimal Roy.A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design[J]. International Journal of Information Security . 2006 (2)
  • 7Juels A,Rivest RL,Szydlo M.The blocker tag:Selective blocking of RFID tags for consumer privacy. Proceedings of the 10th ACM Conference on Computerand Communications Security(CCS 2003) . 2003
  • 8BAUER K,LEE H.A distributed authentication scheme for a wire-less sensing system. ACM Transactions on Information and Sys-tem Security . 2008
  • 9Bellare M,Canetti R,Krawczyk H.Keyed Hash Functions and Message Authentication. Advances in Cryptology-CRYPIO’96 . 1996
  • 10C.Floerkemeier,M.Langheinrich,E.Fleisch,F.Mattern,S.E.Sarma."The Internet of Things,". First international conference,IOT 2008 . 2008

共引文献116

同被引文献15

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部