999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

An authenticated key agreement protocol with unbalanced computing costs for resource—limited devices in IoT

2018-04-26 10:32:48YanXuJieZhangXinHuang
科學與財富 2018年6期

Yan Xu Jie Zhang Xin Huang

摘 要:The Internet of Things (IoT) is a fast-growing industry that is bound to transform homes, cities and factories. Due to its broad influence in our life, IoT has grown exponentially in the last decade and appealed to researchers. Nowadays, during its rapid growth, IoT is facing with several challenges, of which the security issue is one of the biggest one. In this paper, we design a protocol with the help of Elliptic Curve Cryptography (ECC) to secure messages exchange. This protocol reduces the computational cost on the sensor node through transferring some heavy computing tasks to the coordinator. Finally, the implementation details of the protocol are presented.

關鍵詞:Internet of Things, Elliptic curve cryptography, authenticated key agreement.

I. INTRODUCTION

The Internet of things (IoT) is a new stage in the development of ubiquitous networks. Although IoT develops rapidly, it is inevitably associated with security issues. Especially in low-powerful nodes. In terms of [1], small sensor nodes with the less processing capacity are applied in IoT increasingly. Meanwhile, Fadi et al. [2] notices the limitation in battery life, storage space and processing power of resource-limited sensor nodes. [3] points out that an adversary can impersonate the initiator, responder or initiate the man-in-the-middle attack. The initiator and responder have a false impression that they have a shared key. Nevertheless, each of them has a shared key with the attacker. Because of this, the communication security is vulnerable [4]. Furthermore, due to the limited battery and the limited processing power of sensor nodes, the computational burdens of sensors must be reduced [5].

This paper aims to secure the communication between sensor node and coordinator. Based on it, one security protocol is designed by using ECC algorithm. In our design, IoT establishes a secure link for Raspberry Pi and Laptop through this protocol.

II.IMPLEMENTATION

In this section, we carry out a set of experiments for the protocol to test the performance and system. These experiments were performed on Raspberry pi and PC. The HMAC function used for the experiments is SHA256. Five elliptic curves i.e. Curve P-192, P-224, P-256, P-384, P-521 are employed in our experiment. The PC is used as the monitor of Raspberry pi. We verify whether our protocol is useful when we carry them on the PC and Raspberry pi.

We run these five curves for ten times with each of them. Additionally, in order to observe the runtime of both sides more clearly, the average runtime of each elliptic curve is computed as shown in table 1:

According to the table 1, the runtime of the side on the sensor node is shorter than the runtime of the side on the coordinator. Therefore, we believe that shift the computational burden from sensor node to the coordinator is efficient to low-powerful sensors.

III.CONCLUSION

In this thesis, an improved protocol of IEEE 802.15.6 displayed authenticated association is designed. Our protocol realized the following aims of design: 1) Secure the communication between coordinator and sensor node. 2) Reduce the computing costs of the sensor node by shifting computational burden from sensor node to coordinator.

In the future, we plan to build a stronger network with other algorithms and add more sensor nodes to test our protocol.

REFERENCES

[1]Xue, N., Liang, L., Zhang, J., & Huang, X. (2016, June). An access control system for intelligent buildings. In Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications (pp. 11-17). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).

[2]Hamad, F., Smalov, L., & James, A. (2009). Energy-aware Security in M-Commerce and the Internet of Things. IETE Technical review, 26(5), 357-362.

[3]Huang, X., Liu, D., & Zhang, J. (2015, November). An improved IEEE 802.15. 6 password authenticated association protocol. In Communications in China (ICCC), 2015 IEEE/CIC International Conference on (pp. 1-5). IEEE.

[4]Zhang, J., Xue, N., & Huang, X. (2016). A Secure System for Pervasive Social Network-Based Healthcare. IEEE Access, 4, 9239-9250.

[5]Zhang, J., Huang, X., Craig, P., Marshall, A., & Liu, D. (2016). An improved protocol for the password authenticated association of IEEE 802.15. 6 standard that alleviates computational burden on the node. Symmetry, 8(11), 131..

主站蜘蛛池模板: 色噜噜狠狠狠综合曰曰曰| 97国产在线观看| 欧美日韩在线成人| lhav亚洲精品| 亚洲欧美日韩中文字幕在线| 亚洲国产成人无码AV在线影院L| 国产色图在线观看| 亚洲欧美精品日韩欧美| 国产色网站| 国产成人精品一区二区三区| 日韩视频免费| 欧美激情伊人| 国产精品 欧美激情 在线播放| 激情六月丁香婷婷四房播| 91精品情国产情侣高潮对白蜜| 久久久久国产精品熟女影院| 国产精品分类视频分类一区| 黄色国产在线| 蜜芽国产尤物av尤物在线看| 国产女人在线视频| 亚洲精品少妇熟女| 99精品久久精品| 新SSS无码手机在线观看| 日韩毛片在线播放| AⅤ色综合久久天堂AV色综合| 波多野结衣无码视频在线观看| 国产精品女主播| 免费av一区二区三区在线| 四虎成人精品| 狼友视频一区二区三区| 免费在线a视频| 综1合AV在线播放| 国产黄色爱视频| 亚洲首页在线观看| 国产精品v欧美| 日韩二区三区无| h视频在线观看网站| 日本成人福利视频| 欧美精品啪啪| 在线亚洲精品自拍| 久久精品人妻中文系列| 午夜一级做a爰片久久毛片| 福利片91| 国产精品亚洲日韩AⅤ在线观看| 久久中文字幕2021精品| 99精品热视频这里只有精品7| 欧美综合成人| 国产永久在线视频| 国产亚洲欧美日韩在线观看一区二区| 欧美性久久久久| 久久免费精品琪琪| 996免费视频国产在线播放| 日本成人精品视频| 香蕉伊思人视频| 狠狠干综合| 久久人搡人人玩人妻精品一| 视频二区亚洲精品| 国产乱子伦精品视频| 91口爆吞精国产对白第三集 | 伊人AV天堂| 欧美午夜视频在线| 欧美无专区| 干中文字幕| 在线观看欧美精品二区| 一区二区三区毛片无码 | 最新国产麻豆aⅴ精品无| 免费AV在线播放观看18禁强制| 国产真实乱了在线播放| 国内熟女少妇一线天| 伊人成人在线| 国产视频一二三区| 欧美成人在线免费| 天天色综网| 中文字幕啪啪| 91精品国产自产在线观看| 亚洲国产日韩一区| 国产凹凸视频在线观看| 重口调教一区二区视频| 欧美日在线观看| 国产成人精品日本亚洲| 麻豆AV网站免费进入| 欧美日韩91|