浏览全部资源
扫码关注微信
1. 电子科技大学中山学院,广东 中山 528400
2. 电子科技大学机械电子工程学院,四川 成都 611731
[ "程文彬(1965−),男,电子科技大学中山学院副教授,主要研究方向为物联网、智能家居、无线传感器及其网络等。" ]
[ "刘佳(1989−),男,电子科技大学机械电子工程学院硕士生,主要研究方向为物联网、智能家居。" ]
网络出版日期:2017-06,
纸质出版日期:2017-06-20
移动端阅览
程文彬, 刘佳. 基于ECC的智能家居密钥管理机制的实现[J]. 电信科学, 2017,33(6):121-128.
Wenbin CHENG, Jia LIU. Realization of smart home key management mechanism based on ECC[J]. Telecommunications science, 2017, 33(6): 121-128.
程文彬, 刘佳. 基于ECC的智能家居密钥管理机制的实现[J]. 电信科学, 2017,33(6):121-128. DOI: 10.11959/j.issn.1000-0801.2017195.
Wenbin CHENG, Jia LIU. Realization of smart home key management mechanism based on ECC[J]. Telecommunications science, 2017, 33(6): 121-128. DOI: 10.11959/j.issn.1000-0801.2017195.
目前智能家居系统的数据加密技术多采用对称加密方式,但是这种方式存在密钥管理的问题,为实现密钥的安全,智能家居系统采用非对称加密技术,在此基础上设计了基于椭圆曲线密码体制(ECC)的密钥管理机制来达到保障密钥安全的目的。本密钥管理机制包括基于ECC的数据加密密钥管理机制和基于ECC的数字签名密钥管理机制,它们可以使得无线网络节点在身份认证,密钥的产生、分发、存储、更新等环节中密钥的安全性得到保障,其中密钥的存储环节利用了芯片内部闪存的读保护机制,实现了硬件级别的安全存储。最后对本机制的安全性、耗时和可扩展性进行了分析,结果表明该机制具有较强的安全性和可扩展性,在耗时方面优于E-G密钥管理方案。
At present
the data encryption technology of smart home system uses symmetric encryption method
but there is a problem with key management in this way.To achieve the security of the key
the smart home system uses asymmetric encryption technology.On this basis
the key management mechanism based on ECC was designed to achieve the purpose of guaranteeing key security.The key management mechanism includes an ECC-based data encryption key management mechanism and an ECC-based digital signature key management mechanism.So that the wireless network node in the identity authentication
the key generation
distribution
storage
update and other aspects of the key security were guaranteed.Finally
the security
time-consuming and scalability of this mechanism were analyzed.The results show that the mechanism has strong security and expansibility
and it is superior to E-G key management scheme in time-consuming.
PIRBHULAL S , ZHANG H , ALAHI M E , et al . A novel secure IoT-based smart home automation system using a wireless sensor network [J ] . Sensors , 2016 , 17 ( 1 ): 6 - 9 .
LU Y R , LI L X , PENG H P , et al . An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography [J ] . Multimedia Tools &Applications , 2017 , 76 ( 2 ): 1801 - 1815 .
ALTOP D K , BINGÖL M A , LEVI A , et al . DKEM:secure and efficient distributed key establishment protocol for wireless mesh networks [J ] . Ad Hoc Networks , 2016 ( 54 ): 53 - 68 .
ABDALLA M , BENHAMOUDA F , POINTCHEVAL D . Public-key encryption indistinguishable under plaintext-checkable attacks [J ] . Iet Information Security , 2016 , 10 ( 6 ): 288 - 303 .
金宁 , 张道远 , 高建桥 , 等 . 对称密码和非对称密码算法在无线传感器网络中应用研究 [J ] . 传感技术学报 , 2011 , 24 ( 6 ): 874 - 878 .
JIN N , ZHANG D Y , GAO J Q , et al . A study on the application of symmetric ciphers and asymmetric ciphers in wireless networks [J ] . Chinese Journal of Sensors and Actuators , 2011 , 24 ( 6 ): 874 - 878 .
王崇霞 , 高美真 , 刘倩 , 等 . 混合云联合身份认证与密钥协商协议设计 [J ] . 电信科学 , 2014 , 30 ( 4 ): 95 - 99 ,108.
WANG C X , GAO M Z , LIU Q , et al . Design of united identity authentication and key agreement protocol for hybrid cloud [J ] . Telecommunications Science , 2014 , 30 ( 4 ): 95 - 99 ,108.
任伟 . 现代密码学 [M ] . 北京 : 北京邮电大学出版社 , 2011 .
REN W . Modern cryptography [M ] . Beijing : Beijing University of Posts and Telecommunications PressPress , 2011 .
0
浏览量
674
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构