999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

An authenticated key agreement protocol with unbalanced computing costs for resource—limited devices in IoT

2018-04-26 10:32:48YanXuJieZhangXinHuang
科學與財富 2018年6期

Yan Xu Jie Zhang Xin Huang

摘 要:The Internet of Things (IoT) is a fast-growing industry that is bound to transform homes, cities and factories. Due to its broad influence in our life, IoT has grown exponentially in the last decade and appealed to researchers. Nowadays, during its rapid growth, IoT is facing with several challenges, of which the security issue is one of the biggest one. In this paper, we design a protocol with the help of Elliptic Curve Cryptography (ECC) to secure messages exchange. This protocol reduces the computational cost on the sensor node through transferring some heavy computing tasks to the coordinator. Finally, the implementation details of the protocol are presented.

關鍵詞:Internet of Things, Elliptic curve cryptography, authenticated key agreement.

I. INTRODUCTION

The Internet of things (IoT) is a new stage in the development of ubiquitous networks. Although IoT develops rapidly, it is inevitably associated with security issues. Especially in low-powerful nodes. In terms of [1], small sensor nodes with the less processing capacity are applied in IoT increasingly. Meanwhile, Fadi et al. [2] notices the limitation in battery life, storage space and processing power of resource-limited sensor nodes. [3] points out that an adversary can impersonate the initiator, responder or initiate the man-in-the-middle attack. The initiator and responder have a false impression that they have a shared key. Nevertheless, each of them has a shared key with the attacker. Because of this, the communication security is vulnerable [4]. Furthermore, due to the limited battery and the limited processing power of sensor nodes, the computational burdens of sensors must be reduced [5].

This paper aims to secure the communication between sensor node and coordinator. Based on it, one security protocol is designed by using ECC algorithm. In our design, IoT establishes a secure link for Raspberry Pi and Laptop through this protocol.

II.IMPLEMENTATION

In this section, we carry out a set of experiments for the protocol to test the performance and system. These experiments were performed on Raspberry pi and PC. The HMAC function used for the experiments is SHA256. Five elliptic curves i.e. Curve P-192, P-224, P-256, P-384, P-521 are employed in our experiment. The PC is used as the monitor of Raspberry pi. We verify whether our protocol is useful when we carry them on the PC and Raspberry pi.

We run these five curves for ten times with each of them. Additionally, in order to observe the runtime of both sides more clearly, the average runtime of each elliptic curve is computed as shown in table 1:

According to the table 1, the runtime of the side on the sensor node is shorter than the runtime of the side on the coordinator. Therefore, we believe that shift the computational burden from sensor node to the coordinator is efficient to low-powerful sensors.

III.CONCLUSION

In this thesis, an improved protocol of IEEE 802.15.6 displayed authenticated association is designed. Our protocol realized the following aims of design: 1) Secure the communication between coordinator and sensor node. 2) Reduce the computing costs of the sensor node by shifting computational burden from sensor node to coordinator.

In the future, we plan to build a stronger network with other algorithms and add more sensor nodes to test our protocol.

REFERENCES

[1]Xue, N., Liang, L., Zhang, J., & Huang, X. (2016, June). An access control system for intelligent buildings. In Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications (pp. 11-17). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

[2]Hamad, F., Smalov, L., & James, A. (2009). Energy-aware Security in M-Commerce and the Internet of Things. IETE Technical review, 26(5), 357-362.

[3]Huang, X., Liu, D., & Zhang, J. (2015, November). An improved IEEE 802.15. 6 password authenticated association protocol. In Communications in China (ICCC), 2015 IEEE/CIC International Conference on (pp. 1-5). IEEE.

[4]Zhang, J., Xue, N., & Huang, X. (2016). A Secure System for Pervasive Social Network-Based Healthcare. IEEE Access, 4, 9239-9250.

[5]Zhang, J., Huang, X., Craig, P., Marshall, A., & Liu, D. (2016). An improved protocol for the password authenticated association of IEEE 802.15. 6 standard that alleviates computational burden on the node. Symmetry, 8(11), 131..

主站蜘蛛池模板: 人妻精品全国免费视频| 人妻中文久热无码丝袜| 不卡无码网| 国产97视频在线| 8090午夜无码专区| 青青久久91| 亚洲人成高清| 成人一区专区在线观看| 综合五月天网| 超碰91免费人妻| 在线a网站| 国产一区二区三区视频| 一本综合久久| 亚洲天堂免费| 免费在线成人网| 在线观看国产黄色| 成人毛片免费在线观看| 五月综合色婷婷| 亚洲天堂.com| 在线99视频| 国产福利一区二区在线观看| 69综合网| 在线播放真实国产乱子伦| 欧美性爱精品一区二区三区| 久久夜夜视频| 国内精品伊人久久久久7777人| 国产精品福利一区二区久久| 中文字幕2区| 亚洲精品无码在线播放网站| 国产主播在线一区| 亚洲色大成网站www国产| 黄色网页在线观看| 国产激情无码一区二区APP| 99热在线只有精品| 国产在线视频欧美亚综合| 久久狠狠色噜噜狠狠狠狠97视色 | 国产精品区网红主播在线观看| 天天综合色网| 国产在线一二三区| 国产亚洲高清视频| 日本免费精品| 最新加勒比隔壁人妻| 色九九视频| 国产女人在线观看| 99视频在线免费看| 波多野结衣视频一区二区| 福利姬国产精品一区在线| 国产xxxxx免费视频| 婷婷成人综合| 国产91九色在线播放| 国产资源免费观看| 国产无人区一区二区三区| 欧美一级一级做性视频| 久久情精品国产品免费| 热这里只有精品国产热门精品| 国产成人高清精品免费| 一本一道波多野结衣一区二区| 国产精品久久久久久久久| 人妻夜夜爽天天爽| 欧美19综合中文字幕| 99re精彩视频| 欧美另类精品一区二区三区| 亚洲无码熟妇人妻AV在线| 午夜激情福利视频| 成人毛片免费观看| 色欲国产一区二区日韩欧美| 国产迷奸在线看| 免费无码在线观看| 国产97公开成人免费视频| 久久久无码人妻精品无码| jijzzizz老师出水喷水喷出| 老司机午夜精品网站在线观看| 久久综合丝袜长腿丝袜| 成人小视频网| 久久青青草原亚洲av无码| 91精品综合| 久久永久免费人妻精品| 国产精品任我爽爆在线播放6080 | 午夜精品影院| 视频国产精品丝袜第一页| 热思思久久免费视频| 欧美人与动牲交a欧美精品|