Font Size: a A A

Research On The Efficiency And Security Of Attribute-based Encryption Mechanism In The Internet Of Things Scenario

Posted on:2022-09-16Degree:MasterType:Thesis
Country:ChinaCandidate:H Z YuFull Text:PDF
GTID:2518306491985699Subject:Engineering · Software Engineering
Abstract/Summary:PDF Full Text Request
Since 2015,the rapid development of Io T-related technologies has spawned numerous practical applications,and transmission efficiency and security issues in Io T scenarios have gradually emerged.Although the Internet of Things scenario is an extension of the Internet system,it has its own characteristics that are different from the Internet system: it is mainly manifested in a series of problems such as the number and variety of devices,limited computing and communication resources,and weak security issues.The target scene may be combined with multiple network domains,so the number of devices is large,and in real applications,there is a trend of hierarchical distribution;Because of the large number of devices and simple structure,they cannot bear more computing and transmission costs,so computing and communication resources are limited.Due to the problem of limited computing resources,the system itself is not easy to construct a traditional complete password and verification system,which brings great hidden dangers to authorization verification,privacy protection,and brute-force attack.Based on the characteristics of the above Io T scenarios,many researchers combine the transmission design of the Io T scenarios with the attribute-based encryption(ABE)mechanism,which relieves the computing pressure of the devices in the Io T scenarios and strengthens confidentiality guarantees.However,there are still some problems in current research.(1)The problem of efficiency.At present,the mainstream ABE encryption mechanism adopts the scheme design that combines attribute leveling processing and bilinear pairing operation,and it is not suitable for Io T scenarios in terms of application efficiency.(2)Security issues.There are privacy security issues in the private key generation stage and collusion attacks derived from the legitimacy of the user's private key;the traditional ABE mechanism uses a single-center structure,and in the open one-to-many communication scenario of the Internet of Things,there will be a single point of failure problem,and load balancing problems caused by dense communication.In response to the problems in the above research,the main contributions of this paper are as follows:1.In terms of efficiency: according to the definition and classification of the Internet of Things scene attributes,a weighted attribute-based encryption scheme under hierarchical attributes is designed;The elliptic curve scalar product operation is used to replace the traditional bilinear pairing operation with a larger computational order of magnitude,aiming to improve the overall efficiency of applying ABE schemes in Io T scenarios.2.In terms of security: A KEK tree structure that is different from the traditional access control structure is used to deal with the problem of collusion attacks.This structure can ensure that all users have a unique key value and aim to reduce the possibility of collusion attacks;In order to solve the problem of privacy protection,an attribute summary hiding strategy for hash desensitization of sensitive information and assisted verification in the cloud environment is proposed to protect the attribute privacy of information recipients;The traditional single-center design scheme is improved,and the multi-center organization group is adopted to avoid the single point of failure problem and adapt to the load balancing requirements of the multi-device scenario of the Internet of Things.Finally,this paper compares the design scheme with other schemes from the four aspects of functional analysis,communication cost,calculation cost,and experimental analysis,to verify the effectiveness and feasibility of the scheme in the Internet of Things scenario.
Keywords/Search Tags:Internet of Things scenario, attribute base encryption, weight attribute layering, elliptic curve, Multi-center load balancing
PDF Full Text Request
Related items