999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

An authenticated key agreement protocol with unbalanced computing costs for resource—limited devices in IoT

2018-04-26 10:32:48YanXuJieZhangXinHuang
科學與財富 2018年6期

Yan Xu Jie Zhang Xin Huang

摘 要:The Internet of Things (IoT) is a fast-growing industry that is bound to transform homes, cities and factories. Due to its broad influence in our life, IoT has grown exponentially in the last decade and appealed to researchers. Nowadays, during its rapid growth, IoT is facing with several challenges, of which the security issue is one of the biggest one. In this paper, we design a protocol with the help of Elliptic Curve Cryptography (ECC) to secure messages exchange. This protocol reduces the computational cost on the sensor node through transferring some heavy computing tasks to the coordinator. Finally, the implementation details of the protocol are presented.

關鍵詞:Internet of Things, Elliptic curve cryptography, authenticated key agreement.

I. INTRODUCTION

The Internet of things (IoT) is a new stage in the development of ubiquitous networks. Although IoT develops rapidly, it is inevitably associated with security issues. Especially in low-powerful nodes. In terms of [1], small sensor nodes with the less processing capacity are applied in IoT increasingly. Meanwhile, Fadi et al. [2] notices the limitation in battery life, storage space and processing power of resource-limited sensor nodes. [3] points out that an adversary can impersonate the initiator, responder or initiate the man-in-the-middle attack. The initiator and responder have a false impression that they have a shared key. Nevertheless, each of them has a shared key with the attacker. Because of this, the communication security is vulnerable [4]. Furthermore, due to the limited battery and the limited processing power of sensor nodes, the computational burdens of sensors must be reduced [5].

This paper aims to secure the communication between sensor node and coordinator. Based on it, one security protocol is designed by using ECC algorithm. In our design, IoT establishes a secure link for Raspberry Pi and Laptop through this protocol.

II.IMPLEMENTATION

In this section, we carry out a set of experiments for the protocol to test the performance and system. These experiments were performed on Raspberry pi and PC. The HMAC function used for the experiments is SHA256. Five elliptic curves i.e. Curve P-192, P-224, P-256, P-384, P-521 are employed in our experiment. The PC is used as the monitor of Raspberry pi. We verify whether our protocol is useful when we carry them on the PC and Raspberry pi.

We run these five curves for ten times with each of them. Additionally, in order to observe the runtime of both sides more clearly, the average runtime of each elliptic curve is computed as shown in table 1:

According to the table 1, the runtime of the side on the sensor node is shorter than the runtime of the side on the coordinator. Therefore, we believe that shift the computational burden from sensor node to the coordinator is efficient to low-powerful sensors.

III.CONCLUSION

In this thesis, an improved protocol of IEEE 802.15.6 displayed authenticated association is designed. Our protocol realized the following aims of design: 1) Secure the communication between coordinator and sensor node. 2) Reduce the computing costs of the sensor node by shifting computational burden from sensor node to coordinator.

In the future, we plan to build a stronger network with other algorithms and add more sensor nodes to test our protocol.

REFERENCES

[1]Xue, N., Liang, L., Zhang, J., & Huang, X. (2016, June). An access control system for intelligent buildings. In Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications (pp. 11-17). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

[2]Hamad, F., Smalov, L., & James, A. (2009). Energy-aware Security in M-Commerce and the Internet of Things. IETE Technical review, 26(5), 357-362.

[3]Huang, X., Liu, D., & Zhang, J. (2015, November). An improved IEEE 802.15. 6 password authenticated association protocol. In Communications in China (ICCC), 2015 IEEE/CIC International Conference on (pp. 1-5). IEEE.

[4]Zhang, J., Xue, N., & Huang, X. (2016). A Secure System for Pervasive Social Network-Based Healthcare. IEEE Access, 4, 9239-9250.

[5]Zhang, J., Huang, X., Craig, P., Marshall, A., & Liu, D. (2016). An improved protocol for the password authenticated association of IEEE 802.15. 6 standard that alleviates computational burden on the node. Symmetry, 8(11), 131..

主站蜘蛛池模板: 精品欧美一区二区三区在线| 亚洲精品人成网线在线| 欧美亚洲激情| 午夜无码一区二区三区| A级毛片高清免费视频就| 日本高清在线看免费观看| 亚洲国产精品VA在线看黑人| 99热这里只有精品在线观看| 99精品视频播放| 成人va亚洲va欧美天堂| 久久人妻系列无码一区| 国产高清在线观看| 欧美国产综合色视频| 亚洲天堂网在线视频| 久草视频中文| 欧美h在线观看| 久久婷婷五月综合色一区二区| 91麻豆精品国产高清在线| 亚洲欧美天堂网| 欧美精品在线观看视频| 99er这里只有精品| 日本色综合网| 国产亚洲精品97在线观看| 国产永久在线观看| 国产在线精彩视频二区| 伦伦影院精品一区| 在线色国产| 日韩黄色在线| 亚洲人成影视在线观看| 日韩亚洲高清一区二区| 中国一级毛片免费观看| 欧美国产日产一区二区| 波多野结衣爽到高潮漏水大喷| 久久鸭综合久久国产| 国产美女在线观看| 色婷婷综合激情视频免费看| 欧美精品成人一区二区视频一| 欧美国产综合色视频| 亚洲av色吊丝无码| 欧美黄网在线| 欧亚日韩Av| 国产精品福利社| 午夜福利在线观看成人| 欧美a级完整在线观看| 色综合天天综合中文网| 亚洲一区第一页| 天天综合网站| 国产激情在线视频| 国产精品一区二区不卡的视频| 国产在线观看一区精品| 亚洲天堂日韩av电影| 99r在线精品视频在线播放| 国产自视频| 国产女主播一区| 国产成人免费高清AⅤ| 丝袜国产一区| 人妻夜夜爽天天爽| 91久久天天躁狠狠躁夜夜| 午夜国产大片免费观看| 亚洲va视频| 久久99国产综合精品1| 伊人激情综合网| 88国产经典欧美一区二区三区| 国产尤物在线播放| 精品一区二区三区四区五区| 国产精品视频观看裸模| 亚洲一区无码在线| 欧美国产在线一区| 亚洲高清中文字幕| 国产迷奸在线看| 亚洲欧洲AV一区二区三区| 久久婷婷六月| 成人国产一区二区三区| 久久久精品国产亚洲AV日韩| 香蕉伊思人视频| 亚洲国内精品自在自线官| 国产嫩草在线观看| 91小视频在线观看| 久久这里只有精品23| 免费观看国产小粉嫩喷水| 99视频国产精品| 性视频久久|