Secure and efficient information acquisition mechanism for internet of things

被引:0
作者
Luo, Ming [1 ]
Huang, Pingping [1 ]
Huang, Donghua [1 ]
机构
[1] School of Software, Nanchang University
来源
Journal of Computational Information Systems | 2014年 / 10卷 / 04期
关键词
Certificateless public key cryptography; Information acquisition; Internet of things; Key agreement; Mutual authentication;
D O I
10.12733/jcis9176
中图分类号
学科分类号
摘要
The security flaws of information acquisition mechanism for Internet of Things (IoT) are analyzed, based on the certificateless public key cryptography, a secure and efficient information acquisition mechanism for Internet of Things is proposed. The mechanism achieves mutual authentication between the IoT nodes reader and Information Server of Things, session key agreement, and secure transmission of the information acquisition request and response messages for Internet of Things. The security proof and implementation analysis reveal that this mechanism is secure and has low computational costs, meets the security and performance requirements of information acquisition mechanism for Internet of Things. © 2014 Binary Information Press.
引用
收藏
页码:1385 / 1392
页数:7
相关论文
共 14 条
[1]  
Atzori L., Iera A., Morabito G., The internet of things: A survey, Computer Networks, 54, pp. 2787-2805, (2010)
[2]  
Zorzi M., Gluhak A., Lange S., Bassi A., From today's Internet of things to a future Internet of things: A wireless-and mobility-related view, IEEE Wireless Communications, 17, pp. 44-51, (2010)
[3]  
Bandyopadhyay D., Sen J., Internet of things: Applications and challenges in technology and standardization, Wireless Personal Communications, 58, pp. 49-69, (2011)
[4]  
Wu Z., Zhou Y., Ma J., Secure transmission model of Internet of Things, Chinese Journal of Computers, 34, pp. 1351-1364, (2011)
[5]  
Polk T., Turner S., Security challenges for the Internet of things, Pro. Interconnecting Smart Objects with the Internet Workshop, pp. 50-52, (2011)
[6]  
Suo H., Wan J., Zou C., Liu J., Security in the internet of things: A review, Pro. ICCSEE 2012, pp. 648-651, (2012)
[7]  
Lee J., Zhou H., Liang Z.H., Wan X.C., Chen Y.H., The wireless sensor network security protocol research in internet of things, Advances in Intelligent and Soft Computing, 149, pp. 241-247, (2012)
[8]  
Yan T., Wen Q., A trust-third-party based key management protocol for secure mobile rfid service based on the internet of things, Advances in Intelligent and Soft Computing, 135, pp. 201-208, (2012)
[9]  
Liu J., Hu X., Wei Z., Jia D., Song C., Location privacy protect model based on positioning middleware among the Internet of things, Pro. ICCSEE 2012, pp. 288-291, (2012)
[10]  
Saied Y.B., Olivereau A., HIP tiny exchange (TEX): A distributed key exchange scheme for HIP-based internet of things, Pro. Communications and Networking, pp. 1-8, (2012)