999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

An authenticated key agreement protocol with unbalanced computing costs for resource—limited devices in IoT

2018-04-26 10:32:48YanXuJieZhangXinHuang
科學與財富 2018年6期

Yan Xu Jie Zhang Xin Huang

摘 要:The Internet of Things (IoT) is a fast-growing industry that is bound to transform homes, cities and factories. Due to its broad influence in our life, IoT has grown exponentially in the last decade and appealed to researchers. Nowadays, during its rapid growth, IoT is facing with several challenges, of which the security issue is one of the biggest one. In this paper, we design a protocol with the help of Elliptic Curve Cryptography (ECC) to secure messages exchange. This protocol reduces the computational cost on the sensor node through transferring some heavy computing tasks to the coordinator. Finally, the implementation details of the protocol are presented.

關鍵詞:Internet of Things, Elliptic curve cryptography, authenticated key agreement.

I. INTRODUCTION

The Internet of things (IoT) is a new stage in the development of ubiquitous networks. Although IoT develops rapidly, it is inevitably associated with security issues. Especially in low-powerful nodes. In terms of [1], small sensor nodes with the less processing capacity are applied in IoT increasingly. Meanwhile, Fadi et al. [2] notices the limitation in battery life, storage space and processing power of resource-limited sensor nodes. [3] points out that an adversary can impersonate the initiator, responder or initiate the man-in-the-middle attack. The initiator and responder have a false impression that they have a shared key. Nevertheless, each of them has a shared key with the attacker. Because of this, the communication security is vulnerable [4]. Furthermore, due to the limited battery and the limited processing power of sensor nodes, the computational burdens of sensors must be reduced [5].

This paper aims to secure the communication between sensor node and coordinator. Based on it, one security protocol is designed by using ECC algorithm. In our design, IoT establishes a secure link for Raspberry Pi and Laptop through this protocol.

II.IMPLEMENTATION

In this section, we carry out a set of experiments for the protocol to test the performance and system. These experiments were performed on Raspberry pi and PC. The HMAC function used for the experiments is SHA256. Five elliptic curves i.e. Curve P-192, P-224, P-256, P-384, P-521 are employed in our experiment. The PC is used as the monitor of Raspberry pi. We verify whether our protocol is useful when we carry them on the PC and Raspberry pi.

We run these five curves for ten times with each of them. Additionally, in order to observe the runtime of both sides more clearly, the average runtime of each elliptic curve is computed as shown in table 1:

According to the table 1, the runtime of the side on the sensor node is shorter than the runtime of the side on the coordinator. Therefore, we believe that shift the computational burden from sensor node to the coordinator is efficient to low-powerful sensors.

III.CONCLUSION

In this thesis, an improved protocol of IEEE 802.15.6 displayed authenticated association is designed. Our protocol realized the following aims of design: 1) Secure the communication between coordinator and sensor node. 2) Reduce the computing costs of the sensor node by shifting computational burden from sensor node to coordinator.

In the future, we plan to build a stronger network with other algorithms and add more sensor nodes to test our protocol.

REFERENCES

[1]Xue, N., Liang, L., Zhang, J., & Huang, X. (2016, June). An access control system for intelligent buildings. In Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications (pp. 11-17). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

[2]Hamad, F., Smalov, L., & James, A. (2009). Energy-aware Security in M-Commerce and the Internet of Things. IETE Technical review, 26(5), 357-362.

[3]Huang, X., Liu, D., & Zhang, J. (2015, November). An improved IEEE 802.15. 6 password authenticated association protocol. In Communications in China (ICCC), 2015 IEEE/CIC International Conference on (pp. 1-5). IEEE.

[4]Zhang, J., Xue, N., & Huang, X. (2016). A Secure System for Pervasive Social Network-Based Healthcare. IEEE Access, 4, 9239-9250.

[5]Zhang, J., Huang, X., Craig, P., Marshall, A., & Liu, D. (2016). An improved protocol for the password authenticated association of IEEE 802.15. 6 standard that alleviates computational burden on the node. Symmetry, 8(11), 131..

主站蜘蛛池模板: 国产亚洲视频播放9000| 亚洲无限乱码| 亚洲熟女中文字幕男人总站| 在线精品欧美日韩| 国产综合亚洲欧洲区精品无码| 国产h视频在线观看视频| 亚洲国产在一区二区三区| 日韩中文字幕亚洲无线码| 伊人久久久大香线蕉综合直播| 毛片免费观看视频| 亚洲中文字幕在线观看| 精品久久香蕉国产线看观看gif| а∨天堂一区中文字幕| 国产激爽大片在线播放| 午夜高清国产拍精品| 国产91丝袜| 日韩欧美国产成人| 欧洲极品无码一区二区三区| 国产噜噜噜视频在线观看| 99热线精品大全在线观看| 91午夜福利在线观看精品| 久久精品视频亚洲| 91精品最新国内在线播放| 日韩毛片免费观看| 久久鸭综合久久国产| 亚洲精品麻豆| 国产精品妖精视频| 色婷婷在线播放| 香蕉伊思人视频| 久久久久国产精品熟女影院| 伊人久久综在合线亚洲91| 欧美不卡在线视频| 一区二区三区成人| 免费在线a视频| 风韵丰满熟妇啪啪区老熟熟女| 国产最爽的乱婬视频国语对白| 日本道中文字幕久久一区| 国内精品自在自线视频香蕉| 国产aaaaa一级毛片| 成人午夜亚洲影视在线观看| 免费不卡视频| 美女无遮挡免费网站| 日本黄色a视频| 欧美成人A视频| 中国一级特黄大片在线观看| 久久天天躁夜夜躁狠狠| 在线免费看片a| 四虎精品国产永久在线观看| A级毛片无码久久精品免费| 亚洲香蕉久久| 国产亚洲欧美日本一二三本道| 亚洲第一视频网| 九色综合伊人久久富二代| 国产免费怡红院视频| 亚洲中文字幕久久精品无码一区| 秋霞午夜国产精品成人片| 91破解版在线亚洲| 91久久青青草原精品国产| 国产精品太粉嫩高中在线观看| 欧美激情视频一区| 欧美福利在线观看| 精品久久久久无码| 欧美一级高清片久久99| 呦视频在线一区二区三区| 精品少妇人妻一区二区| 国产不卡一级毛片视频| 成人福利一区二区视频在线| 国内丰满少妇猛烈精品播| 中文国产成人精品久久| 9啪在线视频| 欧美成人一区午夜福利在线| 92午夜福利影院一区二区三区| 亚洲欧洲综合| 欧美无专区| 亚洲黄色网站视频| 国产一区二区丝袜高跟鞋| 啊嗯不日本网站| 夜精品a一区二区三区| 国产专区综合另类日韩一区| 国产性生交xxxxx免费| 中文字幕首页系列人妻| 色综合日本|