透過您的圖書館登入
IP:3.144.230.82
  • 學位論文

物聯網的輕量級鑑別機制之研究

The Study of Lightweight Authentication Scheme for Internet of Things

指導教授 : 黃仁俊

摘要


本論文提出一適用於公共安全物聯網的身份鑑別技術,由於物聯網中包含電力和計算資源相對有限的感測器,如穿戴在執勤人員身上的感測器等,所以本論文技術特別著重於減少這些節點之計算負擔。隨著資訊與通訊各種技術的發展,物聯網的相關技術愈來愈成熟,應用面也愈來愈廣,有些國家及學者開始考慮運用此技術建構執行公共安全任務之環境的臨時物聯網,如風災、地震過後等進行緊急救難之區域,在任務區域的許多原有設備可能已被破壞或不穩定,必須快速建構一臨時的資通網路供執勤人員有充分的資源與即時支援執行公共安全任務,這也包括需提供充分的資訊給指揮官以便能統籌資源及掌握任務現場進行指揮和調度。物聯網應用在此一領域,其安全性必須受到特別關注,因執行之公共安全任務本身就涉及社會安全甚至國家安全,尤其一些如打擊犯罪之現場安全通訊不只受自然環境之影響還有可能受人為惡意的破壞。本論文著重於研究公共安全物聯網上以輕量型運算建構的鑑別技術,使物聯網中通聯的雙方能有效率地進行雙向鑑別並建立共同密鑰做為建立安全通道之基礎,本論文技術也提供使用者匿名並防治重送攻擊而通訊雙方也能確認彼此建立之共同密鑰的一致性,相較於目前其他相關研究,本論文為公共安全物聯網提供計算效能佳且安全功能完善的鑑別技術。

並列摘要


This paper proposes an identity authentication scheme for an Internet of Things (IoT) in public safety, including computational and energy resource-constrained sensors for on-site first responders. In addition, we focus on reducing the computational burden. With the development of information and communication technologies, the related work of IoT has become increasingly mature, and the application of IoT has been extended more widely. Recently, many researchers have studied how to construct temporary IoT communication for public safety missions, such as the disaster area of a wind hazard, an earthquake, or other disasters. Most of the communication equipment might be destroyed or unstable in a disaster area. Providing full resources and immediate support for responders and instantly supporting the implementation of a relief assignment require construction of a temporary communication network. If a commander receives useful information regarding the event scene, he or she can conduct and monitor the status of a mission. The application of an IoT in public safety must take security into account. In particular, communication regarding a crime scene not only is affected by the natural environment but might also be subject to malicious destruction. In this paper, we propose a lightweight authentication and key establishment protocol for IoT that not only supports user anonymity but also resists the repeating of an attack to ensure conformity with a session key. A security and performance analysis shows that the proposed scheme has robust and effective authentication comparable to related work.

參考文獻


[3]B. Scannell, “Sensor fusion approach to precision location and tracking for first responders,” Analog Devices Technical Article, 2016.
[4]R. Khan, R. Hasan, and J. Xu, “SEPIA: Secure-PIN-Authentication-as-a-Service for ATM Using Mobile and Wearable Devices,” in Proc. 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, Mar. 2015, pp. 41–50.
[5]R. S. Pippal, C. D. Jaidhar, and S. Tapaswi,“Comments on Symmetric Key Encryption based Smart Card Authentication Scheme,” in Proc. 2010 2nd International Conference on Computer Technology and Development, Nov. 2010, pp. 482–484.
[6]L. B. Jivanadham, A.K.M.M Islam, Y. Katayama, S. Komaki, and S. Baharun, “Cloud Cognitive Authenticator (CCA): A Public Cloud Computing Authentication Mechanism,” in Proc. 2013 International Conference on Informatics, Electronics and Vision (ICIEV), 2013, pp. 1–6.
[7]N. Kahani, K. Elgazzar, J. R. Cordy, “Authentication and Access Control in e-Health Systems in the Cloud,”in Proc. 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), 2016, pp.13-23.

延伸閱讀