首页 | 官方网站   微博 | 高级检索  
     

一种轻量级的动态化密钥协商的物联网身份认证协议研究
引用本文:崔维,张国山,李晖. 一种轻量级的动态化密钥协商的物联网身份认证协议研究[J]. 计算机应用研究, 2016, 33(2)
作者姓名:崔维  张国山  李晖
作者单位:河北科技师范学院,天津大学,河北科技师范学院
摘    要:针对物联网络在用户身份验证上存在的安全性问题,提出一种轻量级的动态化密钥协商的物联网身份认证协议(DLT)。该协议在用户进行登陆验证上使用了时间戳值,这使得恶意攻击者不能使用早期的消息,可以防范重放攻击以及拒绝服务攻击;在认证和密钥协商阶段采用了用户、服务器、控制服务器三者之间的互相验证,并且在公共信道上对服务器密钥和随机值进行了分离处理,使得攻击者无法窃听到其他用户的安全信息。协议安全性分析及仿真对比结果表明,DLT协议相比对比协议具有更多的安全功能,可以防范多种网络攻击,并且协议的能量代价更低。

关 键 词:物联网;身份认证协议;动态化密钥协商;网络攻击
收稿时间:2014-10-11
修稿时间:2015-12-27

A dynamic key negotiation Things authentication protocol with lightweight
cuiwei,zhangguoshan and Li Hui. A dynamic key negotiation Things authentication protocol with lightweight[J]. Application Research of Computers, 2016, 33(2)
Authors:cuiwei  zhangguoshan  Li Hui
Affiliation:Hebei Normal University of Science and Technology,Tianjin University,Hebei Normal University of Science and Technology
Abstract:For user authentication on the existence of security issues in Things network, a dynamic key negotiation Things authentication protocol with lightweight is proposed(DLT). The agreement on the user login authentication using a timestamp value, which makes the news earlier malicious attackers can not use, you can prevent replay attacks and denial of service attacks. In the authentication and key negotiation with a user, server, and control among mutual authentication server, and the server public key and random channel values were isolated treatment, making the attacker can not eavesdrop on the other user's security information. Protocol security analysis and simulation results show that comparison, DLT protocol has more security features compared to the comparison protocol can defend against various network attacks, and lower energy cost agreement.
Keywords:Things   dynamic key negotiation     authentication protocol network attacks
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号