Font Size: a A A

Research On Identity Authentication And Confidential Communication Based On Smart Home

Posted on:2021-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:D W SongFull Text:PDF
GTID:2392330605960667Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Smart home is an emerging key component in IoT applications.Secure communication between users and devices is an important factor.Once be attacked by an adversary,it will directly threaten the personal and property safety of users.In particular,there are many devices in the smart home environment,which are likely to come from different servers,this is different from other environments,how to enable these heterogeneous devices to achieve secure communication is a difficulty,at the same time,most devices have limited capabilities.Therefore,researchers need to design special security protocols to provide protection for them.This article first analyzes the various attacks that devices may face when communicating in a smart home system.Through the study of some existing specific communication and authentication protocols,some problems in this field have been discovered.Aiming at these problems,new secure and efficient communication schemes is proposed.The new solution either optimizes the application scenario,or improves security performance and reduces computing consumption.The specific research process is as follows:1.By analyzing the existing key agreement protocol in the smart home system,it is found that most of the existing protocols need to pass through the gateway no matter in the authentication phase or the subsequent communication phase,which will bring huge communication costs.In view of the above limitations,a new protocol is designed so that internal devices do not need the participation of the gateway during the authentication and communication process,which greatly reduces the communication cost,in addition,the gateway or users can also participate in the protocol for secure communication.Performance analysis and comparison show that this scheme can ensure that the session key is not leaked,can resist replay attacks and impersonation attacks,and the calculation cost is also very low.2.Most of the existing solutions in smart home systems have used certificates to ensure the legitimacy of users,but managing certificates requires significant costs,at the same time,the computing costs needs to be improved.Therefore,a new signcryption scheme(IBS)is proposed using identity-based password technology,on the basis of ensuring data confidentiality and integrity,the heavy hash to point operation is eliminated.The new protocol not only reduces the calculation cost,but also provides a prerequisite for the use ofprovable security theory,simultaneously adds a time stamp to resist replay attacks.Finally,the unforgeability of the signature is proved by provable security theory under the given security model.Performance analysis and comparison show that the scheme has higher security and lower communication and calculation costs.3.Analyzed a type of lightweight communication authentication protocol proposed by Soumya et al.under the attack assumption allowed by the paper,attacks such as privileged internal attacks and offline password guessing are carried out,which can successfully obtain the private key and session key of both parties,and can successfully forge messages,pretend to be users or smart home devices.The results show that the scheme proposed in the paper fails to achieve the stated security performance.
Keywords/Search Tags:smart home, authentication, key agreement, identity-based signcryption, cryptanalysis
PDF Full Text Request
Related items