浏览全部资源
扫码关注微信
1. 江苏第二师范学院数学与信息技术学院,江苏 南京 210013
2. 南京师范大学科技处,江苏 南京 210023
[ "赵洁(1979-),女,江苏第二师范学院数学与信息技术学院讲师,主要研究方向为信息安全及物联网。" ]
[ "张华荣(1980-),女,南京师范大学科技处助理研究员,主要研究方向为管理科学与工程。" ]
网络出版日期:2016-06,
纸质出版日期:2016-06-20
移动端阅览
赵洁, 张华荣. 椭圆曲线加密结合cookie信息的物联网终端安全认证协议[J]. 电信科学, 2016,32(6):136-142.
Jie ZHAO, Huarong ZHANG. Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT[J]. Telecommunications science, 2016, 32(6): 136-142.
赵洁, 张华荣. 椭圆曲线加密结合cookie信息的物联网终端安全认证协议[J]. 电信科学, 2016,32(6):136-142. DOI: 10.11959/j.issn.1000-0801.2016116.
Jie ZHAO, Huarong ZHANG. Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT[J]. Telecommunications science, 2016, 32(6): 136-142. DOI: 10.11959/j.issn.1000-0801.2016116.
针对物联网(IoT)中终端设备接入网络服务器的安全性问题,提出了一种基于椭圆曲线加密(ECC)和cookie信息的物联网终端安全认证协议。协议首先将用户身份信息、服务器私钥、随机数和cookie有效期信息组成一个cookie文件,然后利用椭圆曲线加密体制对其进行加密,并将之存储在智能终端。在认证阶段,通过比对由cookie信息计算的安全参数来实现相互身份认证。性能分析表明,该协议在具有较低计算和通信成本的同时,能够有效抵抗多种攻击,提供了较高的安全性,非常适合应用于物联网中资源有限的终端设备。
For the security problem of terminal devices accessing to the network server in internet of things(IoT),an identity authentication protocol was presented based on elliptic curve cryptography(ECC)and cookie information for internet of things terminal.Firstly,the protocol used user identity information,server private key,random number and expiration time of cookie to form a cookie file.Then,it was encrypted with ECC and stored in the smart terminal.In authentication phase,the mutual authentication was achieved by comparing the security parameters calculated by cookie information.Performance analysis shows that it can resist many kinds of attacks and provide high security,low computation and low communication cost,which was suitable for the terminal devices of limited resources in internet of things.
吴振强 , 周彦伟 , 马建峰 . 物联网安全传输模型 [J ] . 计算机学报 , 2011 , 34 ( 8 ): 1351 - 1364 .
WU Z Q , ZHOU Y W , MA J F . A security transmission model for internet of things [J ] . Chinese Journal of Computers , 2011 , 34 ( 8 ): 1351 - 1364 .
汪礼臻 , 张龙军 . 适合物联网环境的混合双向匿名认证协议 [J ] . 计算机应用研究 , 2015 , 32 ( 1 ): 222 - 225 .
WANG L Z , ZHANG L J . Hybrid mutual anonymous authentication protocol for the internet of things environment [J ] . Application Research of Computers , 2015 , 32 ( 1 ): 222 - 225 .
唐雅玲 . 一种基于认证的物联网安全传输机制 [J ] . 计算机工程 , 2014 , 40 ( 1 ): 144 - 148 .
TANG Y L , . A secure transmission mechanism for internet of things based on certification [J ] . Computer Engineering , 2014 , 40 ( 1 ): 144 - 148 .
黄碧翼 , 陈泽茂 , 朱婷婷 . 基于椭圆曲线签密协议的无线安全认证协议 [J ] . 武汉理工大学学报 , 2013 , 35 ( 6 ): 145 - 150 .
HUANG B Y , CHEN Z M , ZHU T T . Wireless security authentication protocol based on elliptic curve signcryption scheme [J ] . Journal of Wuhan University of Technology , 2013 , 35 ( 6 ): 145 - 150 .
ZHAO G , SI X , WANG J , et al . A novel mutual authentication scheme for internet of things [C ] // IEEE International Conference on Modelling,Identification and Control(ICMIC),June 26-29,2011,Shanghai,China . New Jersey : IEEE Press , 2011 : 563 - 566 .
LI C T , . A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card [J ] . Iet Information Security , 2013 , 7 ( 1 ): 3 - 10 .
SHEN G , ZHEN Y . Application of elliptic curve cryptography in node authentication of internet of things [C ] // 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing,October 16-18,2013,Beijing,China . New Jersey : IEEE Press , 2013 : 452 - 455 .
SHIVRAJ V L , RAJAN M A , SINGH M , et al . One time password authentication scheme based on elliptic curves for internet of things (IoT) [C ] // 5th National Symposium on Information Technology:Towards New Smart World(NSITNSW),February 17-19,2015,Riyadh,Kingdom of Saudi Arabia . New Jersey : IEEE Press , 2015 : 1 - 6 .
HE D , ZEADALLY S . An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography [J ] . Internet of Things Journal IEEE , 2015 , 2 ( 1 ): 72 - 83 .
冯伟华 , 刘亚丽 . 基于cookie的统一认证系统的设计与实现 [J ] . 计算机工程与设计 , 2010 , 31 ( 23 ): 4971 - 4975 .
FENG W H , LIU Y L . Design and implementation of unified authentication system on cookie [J ] . Computer Engineering and Design , 2010 , 31 ( 23 ): 4971 - 4975 .
张文芳 , 王小敏 , 郭伟 , 等 . 基于椭圆曲线加密体制的高效虚拟企业跨域认证协议 [J ] . 电子学报 , 2014 ( 6 ): 1095 - 1102 .
ZHANG W F , WANG X M , GUO W , et al . An efficient inter-enterprise authentication scheme for VE based on the elliptic curve cryptosystem [J ] . Acta Electrctronica Sinica , 2014 ( 6 ): 1095 - 1102 .
刘柱文 , 李丽琳 . 新的基于椭圆曲线的三方口令认证密钥协商协议 [J ] . 计算机应用 , 2011 , 31 ( 10 ): 2687 - 2688 .
LIU Z W , LI L L . New three-party password-based authenticated key agreement protocol with elliptic curve [J ] . Journal of Computer Applications , 2011 , 31 ( 10 ): 2687 - 2688 .
BENINI L . Designing next-generation smart sensor hubs for the internet-of-things [C ] // 5th IEEE International Workshop on Advances in Sensors and Interfaces(IWASI),June 13-14,2013,Bari,Italy . New Jersey : IEEE Press , 2013 : 113
CHEN P Y , CHENG S M , CHEN K C . Information fusion to defend intentional attack in internet of things [J ] . Internet of Things Journal IEEE , 2014 , 1 ( 4 ): 337 - 348 .
冯福伟 , 李瑛 , 徐冠宁 , 等 . 基于集群架构的物联网身份认证系统 [J ] . 计算机应用 , 2013 , 33 ( 1 ): 126 - 129 .
FENG F W , LI Y , XU G N , et al . IoT authentication system based on cluster architecture [J ] . Journal of Computer Applications , 2013 , 33 ( 1 ): 126 - 129 .
0
浏览量
724
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构