999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

An authenticated key agreement protocol with unbalanced computing costs for resource—limited devices in IoT

2018-04-26 10:32:48YanXuJieZhangXinHuang
科學與財富 2018年6期

Yan Xu Jie Zhang Xin Huang

摘 要:The Internet of Things (IoT) is a fast-growing industry that is bound to transform homes, cities and factories. Due to its broad influence in our life, IoT has grown exponentially in the last decade and appealed to researchers. Nowadays, during its rapid growth, IoT is facing with several challenges, of which the security issue is one of the biggest one. In this paper, we design a protocol with the help of Elliptic Curve Cryptography (ECC) to secure messages exchange. This protocol reduces the computational cost on the sensor node through transferring some heavy computing tasks to the coordinator. Finally, the implementation details of the protocol are presented.

關鍵詞:Internet of Things, Elliptic curve cryptography, authenticated key agreement.

I. INTRODUCTION

The Internet of things (IoT) is a new stage in the development of ubiquitous networks. Although IoT develops rapidly, it is inevitably associated with security issues. Especially in low-powerful nodes. In terms of [1], small sensor nodes with the less processing capacity are applied in IoT increasingly. Meanwhile, Fadi et al. [2] notices the limitation in battery life, storage space and processing power of resource-limited sensor nodes. [3] points out that an adversary can impersonate the initiator, responder or initiate the man-in-the-middle attack. The initiator and responder have a false impression that they have a shared key. Nevertheless, each of them has a shared key with the attacker. Because of this, the communication security is vulnerable [4]. Furthermore, due to the limited battery and the limited processing power of sensor nodes, the computational burdens of sensors must be reduced [5].

This paper aims to secure the communication between sensor node and coordinator. Based on it, one security protocol is designed by using ECC algorithm. In our design, IoT establishes a secure link for Raspberry Pi and Laptop through this protocol.

II.IMPLEMENTATION

In this section, we carry out a set of experiments for the protocol to test the performance and system. These experiments were performed on Raspberry pi and PC. The HMAC function used for the experiments is SHA256. Five elliptic curves i.e. Curve P-192, P-224, P-256, P-384, P-521 are employed in our experiment. The PC is used as the monitor of Raspberry pi. We verify whether our protocol is useful when we carry them on the PC and Raspberry pi.

We run these five curves for ten times with each of them. Additionally, in order to observe the runtime of both sides more clearly, the average runtime of each elliptic curve is computed as shown in table 1:

According to the table 1, the runtime of the side on the sensor node is shorter than the runtime of the side on the coordinator. Therefore, we believe that shift the computational burden from sensor node to the coordinator is efficient to low-powerful sensors.

III.CONCLUSION

In this thesis, an improved protocol of IEEE 802.15.6 displayed authenticated association is designed. Our protocol realized the following aims of design: 1) Secure the communication between coordinator and sensor node. 2) Reduce the computing costs of the sensor node by shifting computational burden from sensor node to coordinator.

In the future, we plan to build a stronger network with other algorithms and add more sensor nodes to test our protocol.

REFERENCES

[1]Xue, N., Liang, L., Zhang, J., & Huang, X. (2016, June). An access control system for intelligent buildings. In Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications (pp. 11-17). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

[2]Hamad, F., Smalov, L., & James, A. (2009). Energy-aware Security in M-Commerce and the Internet of Things. IETE Technical review, 26(5), 357-362.

[3]Huang, X., Liu, D., & Zhang, J. (2015, November). An improved IEEE 802.15. 6 password authenticated association protocol. In Communications in China (ICCC), 2015 IEEE/CIC International Conference on (pp. 1-5). IEEE.

[4]Zhang, J., Xue, N., & Huang, X. (2016). A Secure System for Pervasive Social Network-Based Healthcare. IEEE Access, 4, 9239-9250.

[5]Zhang, J., Huang, X., Craig, P., Marshall, A., & Liu, D. (2016). An improved protocol for the password authenticated association of IEEE 802.15. 6 standard that alleviates computational burden on the node. Symmetry, 8(11), 131..

主站蜘蛛池模板: 永久免费无码成人网站| 一级毛片中文字幕| 亚洲三级a| 精品国产自在现线看久久| 另类欧美日韩| 久久无码av一区二区三区| 美女被操91视频| 国产av色站网站| 国产尤物在线播放| 在线播放国产99re| 色视频国产| 九九这里只有精品视频| 日韩久久精品无码aV| 国产97公开成人免费视频| 在线不卡免费视频| 国产精品第一区| 国产精品网址你懂的| 福利国产在线| 婷五月综合| 亚洲欧洲日产国码无码av喷潮| 国产国产人在线成免费视频狼人色| 国产精品永久免费嫩草研究院| 亚洲伦理一区二区| 欧美特黄一免在线观看| 妇女自拍偷自拍亚洲精品| 精品国产毛片| 色哟哟国产精品| 性欧美久久| 日韩午夜福利在线观看| 国产免费黄| 激情亚洲天堂| 中文字幕精品一区二区三区视频 | 97se亚洲| 影音先锋丝袜制服| 亚洲一区毛片| 国产精品嫩草影院视频| 精品91视频| 日韩欧美国产精品| yy6080理论大片一级久久| 中文字幕资源站| 中美日韩在线网免费毛片视频| 啦啦啦网站在线观看a毛片| 亚洲国模精品一区| 日本不卡视频在线| 波多野结衣二区| 啦啦啦网站在线观看a毛片 | 91色在线观看| 亚洲美女一区| 91精品小视频| 欧美性色综合网| 欧美高清三区| 中文字幕在线播放不卡| 欧美高清三区| 最新国产成人剧情在线播放| 日韩福利视频导航| 最新国产成人剧情在线播放 | 精品人妻一区二区三区蜜桃AⅤ| 成人免费黄色小视频| 成人韩免费网站| 青青极品在线| 亚洲va欧美ⅴa国产va影院| 特级毛片免费视频| 久久黄色免费电影| 无码区日韩专区免费系列| 亚洲欧美一区二区三区麻豆| 国产免费网址| 国产成人综合亚洲欧洲色就色| 国产精品久线在线观看| 欧美国产在线精品17p| 午夜毛片免费看| 伊人成色综合网| 日韩精品成人在线| 欧美色视频网站| 九月婷婷亚洲综合在线| 97久久超碰极品视觉盛宴| 亚洲精品午夜天堂网页| 国产门事件在线| 亚洲天堂网视频| 国产微拍精品| 欧美另类视频一区二区三区| 国产男女免费完整版视频| 91麻豆国产视频|