Font Size: a A A

Design And Implementation Of Trusted Security Access Management System Based On Smart Wearable Device

Posted on:2020-09-07Degree:MasterType:Thesis
Country:ChinaCandidate:Z H ZhangFull Text:PDF
GTID:2428330596495338Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
In many IoT and wireless wearable device network scenarios,communication security is difficult to secure.These devices with limited hardware levels are typically deployed dynamically in these environments and are vulnerable to a variety of attacks and threats.In this environment,secure asymmetric key encryption and Diffie-Hellman key agreement are effective mechanisms for responding to attackers.However,communication with a network certification authority is often unavailable or unstable.Under the condition of the smart wearable device system based on Tri-element peer authentication(TePA),we propose a new encryption authentication architecture called TePA-based certificateless encryption authentication system.The user(owner)autonomously updates the key pair without relying on the digital certificate.The TePA-based certificateless encryption authentication system facilitates network nodes to use public keys for periodic update to perform public key encryption.This paper studies the topology of the smart wearable device network system,analyzes the communication requirements of each device node in the system,and determines the identity verification requirements of the smart wearable device network in the application scenario.Combining TePA with Baek's improved computational PKIE key authentication scheme,wearable devices can achieve higher efficiency and stronger security encryption protocols.According to the protocol,the security service component of the smart wearable device identity verification system is designed and implemented,and it participates in the identity security verification process in the authentication system.And the smart wearable device identity verification system simulates the eavesdropper test in the real working environment,and completes the identity authentication of each node in the system.The main research and contributions of this paper include:1.Based on the security challenge of the smart wearable device system,in order to avoid leakage caused by data transmission between nodes,according to the hardware conditions of the current device and the level of software development,the ternary peerauthentication mechanism and the certificateless parallel encryption algorithm are introduced into the smart wear.The device network system significantly improves the security performance of the wearable device network system.2.For the key escrow problem on the TePA architecture,this paper proposes a secure cryptographic authentication architecture combining TePA architecture and certificateless encryption algorithm,and is applied to the smart wearable device system.Compensating for the key update in the TePA architecture relies on the serious flaw of the Key Generation Center to advertise the update key in an unreliable environment.
Keywords/Search Tags:Internet of Things, wearable device, identity verification, ternary equivalent, no certificate
PDF Full Text Request
Related items