Secure Transfer Protocol Research and Design Based on the Internet of Things

Article Preview

Abstract:

By analyzing the security threats faced during the process of Internet data transfer, this paper compares the existing three security schemes, points out their limits and proposes a secure transfer protocol. This protocol can provide data confidentiality protection, data integrity protection, protection against replay attack and non-repudiation protection by ensuring the identities of both communication sides, and thus it ensures the security of data transmission of the Internet of things. This paper first introduces the overall framework of the protocol, then it elaborates the connection establishment and release process, data exchange process, key exchange process, finally it proves the feasibility of the protocol by the experiments.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

619-624

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] W. Stallings. Cryptography And Network Security Principlesand Practices, 4th ed[M]. New Jersey, USA: Prentice Hall, (2005).

Google Scholar

[2] L. Harn and J. Ren. Design Of Fully Deniable Authentication Service For E-mail Applications[J], IEEE Communications Letters, vol. 12, no. 3, p.219–221, (2008).

DOI: 10.1109/lcomm.2008.071793

Google Scholar

[3] W. Chou. Inside SSL: Accelerating Secure Transactions[J], IT Professional, vol. 4, no. 5, p.37–41, (2002).

DOI: 10.1109/mitp.2002.1041177

Google Scholar

[4] R. Oppliger. Security At The Internet Layer[J], Computer, vol. 31, p.43–47, (1998).

Google Scholar

[5] B. Aboba. Extesible Authentication Protocol (EAP) [S]. RFC3748, 2004. 6.

Google Scholar

[6] Network Working Group. RFC2867 RADIUS Accounting Modifications for Tunnel Protocol Support. June (2000).

Google Scholar

[7] Network Working Group. RFC2868 Attributes for Tunnel Protocol Support. June (2000).

Google Scholar

[8] Network Working Group. RFC3575 IANA Consideration for RADIUS. July (2003).

Google Scholar