信息网络安全 ›› 2015, Vol. 15 ›› Issue (11): 27-32.doi: 10.3969/j.issn.1671-1122.2015.11.005

• • 上一篇    下一篇

基于节点认证的物联网感知层安全性问题研究

张玉婷11, 严承华1, 魏玉人2   

  1. 1.海军工程大学信息安全系,湖北武汉 430033
    2.南海舰队司令部 ,广东湛江 524000
  • 收稿日期:2015-10-14 出版日期:2015-11-25 发布日期:2015-11-20
  • 作者简介:

    作者简介: 张玉婷(1991-),女,河北,硕士研究生,主要研究方向:网络安全;严承华(1967-),男,湖北,副教授,博士,主要研究方向:网络安全、数字图像水印等;魏玉人(1968-),女,湖北,高级工程师,硕士,主要研究方向:信息安全。

  • 基金资助:
    湖北省自然科学基金[2015CFA066];全军军事类研究生课题[2014JY457]

Research on Security of IoT Perception Layer Based on Node Authentication

Yu-ting ZHANG1, Cheng-hua YAN1, Yu-ren WEI2   

  1. 1. Department of Information Security, Naval University of Engineering, Wuhan Hubei 430033, China
    2. The South China Sea Fleet Command, Zhanjiang Guangdong 524000, China
  • Received:2015-10-14 Online:2015-11-25 Published:2015-11-20

摘要:

感知层是物联网的信息源,也是物联网各种应用的基础,它存在的安全问题是整个物联网安全的首要问题。随着网络信息安全的不断发展,传统的物联网安全管理系统在网络安全方面尽管能够实现三个层面之间数据信息的互联互通,但对于物联网感知层节点以及节点之间的安全保护系统尚不成熟。节点本身非常容易被控制,极易遭受攻击者的恶意攻击,节点之间相互通信时也非常容易遭受到监听、窃取、假冒、破坏、篡改等攻击。因此,加强物联网感知层节点的身份认证,进而保证物联网整个系统的安全是十分必要的。文章介绍了物联网感知层节点面临的主要安全威胁及相关的安全机制,基于离散对数问题解决椭圆曲线加密算法,给出了相应的身份认证实现方案,使物联网感知层的信息传输更加安全可靠。

关键词: 物联网感知层, 节点, 安全, 认证

Abstract:

The perception layer is the information source of the Internet of things, and also the basis for the application of the Internet of things, the security problem is the primary problem of the whole Internet of things. With the continuous development of network information security, despite the traditional network security management system in the network security can achieve interoperability between the three levels, the security system for the Internet of things sensing layer nodes and between nodes is not mature. Since the nodes are easily controlled, attaches are vulnerable to attack them. When the nodes communicate with each other, it is very easy to be monitored, stole, faked, and destroyed, and so on. From this, it is necessary to strengthen the identity authentication of the Internet of things to ensure the security of the whole system. This paper introduces the main security threats and related security mechanisms of the Internet of things, based on the discrete logarithm problem solving elliptic curve encryption algorithm.

Key words: IoT perception layer, node, security, authentication

中图分类号: