Font Size: a A A

Researchand Design Of Security Protocols In Smart Home Remote Controlsystem

Posted on:2016-09-27Degree:MasterType:Thesis
Country:ChinaCandidate:J J WenFull Text:PDF
GTID:2272330452969028Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
After these years of development of the Internet,interaction and dialogue between humanand human enhances efficiency.However communication between of people(equipments) andequipment has not been fully realized.Smart home and Internet of things(IoT) is the essenceof human(equipments) and equipments exchanges,and through a variety of sensingdevices,such as Radio Frequency Identification(RFID)s,infrared sensors,laser scanning,globalpositioning systems,etc,information collection,exchange and communication, and realize thedevice of intelligent identification, location, tracking and control. In addition, thecommunication by people and quipments can achieve control of the equipment in order tomake these smart devices to better serve humanity. Fot guaranteeing the security ofcommunications between devices you will have to rely on a system of security protocols, soreliable and efficient secure protocol based on digital signature scheme is of great significanceand practical value.Based on the security model for remote agent control design, combined with digitalsignature technology, a set of security protocols is offered applicable to intelligent homeremote control system. The security model roughly points following five a stage: identitycertification stage, agent permission stage, key negotiation stage, interactive stage andfeedback stage. According to above five a stage, this paper starts with certificateless blindsignature, as the first stage of implementation.Then the author learns concepts and analyzesits characteristics.Meanwhile the author proposes a more secure and efficient and provablesecurity scheme by referencing Chen’s scheme.And then depending on the nature requirementof secend stage, restrictive proxy signature is chosen as the implementation of the secendstage. After learning the signature properties, a related scheme combined of factorization anddiscrete logarithm is proposed, which is proved its efficiency and safety.Secondly, by learningthe knowledge of key agreement protocol based on sincryption,which is adopted for the wantof third stage,a relevant protocol is designed,and proved its correction.Finally, the paper introduces two encryption and authentication systems based on abovetwo stage of protocols which is developed by author:based USBKEY transparent virtual harddisk encryption system and based CA service Unified Authentication Platform. The twosystems is born to practical and functional, which can prove the practical value of thesesecurity protocols by using servral theories.
Keywords/Search Tags:smart home, security model, blind signature, restrictive proxy signature, keyagreement protocol, encryption, authentication
PDF Full Text Request
Related items