The Optimization of the Key Exchange Protocol Based on Public Key Certificates in the Internet of Things

Article Preview

Abstract:

We put forward exchange agreement certificate mutual authentication and the session key exchange protocol based on wireless sensor network, which is an improved version of the traditional certificate protocol. In the optimization scheme, the adversary cannot obtain the secret value, and each session process generates a different key, so as to ensure the safety of the encrypted information transmission between nodes.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

629-633

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yang Geng, Xu Jian, Chen Wei. Security features and key technology of the Internet of things [J]. Journal of Nanjing University of Posts and Telecommunications (NATURAL SCIENCE EDITION) ,2010,30(04):20-29.

Google Scholar

[2] Wang He, Yang Hua, Gao Fubing. Security [J]. Sichuan ordnance Journal of Internet of things, 2011, (11) :90-91.

Google Scholar

[3] Hao Wenjiang. Technical security issues of [J]. Network information security of Internet of things, (01), 2010, pp.49-50.

Google Scholar

[4] Dirk H. RFID Security and Privac: Concepts, Protcols, and Architectures. Berlin: Springer, 2008, pp.107-137.

Google Scholar

[5] Juels A. RFID Security and Privacy: A Research Survey. Selected Areas in communication, 24(2), 2006, pp.381-394.

DOI: 10.1109/jsac.2005.861395

Google Scholar

[6] Fu Rong. Network research and implementation of [D] security and privacy protection platform sharing, Beijing Jiaotong University. (2011).

Google Scholar

[7] Diffie W, Hellman M. New Direction in Cryptography. IEEE Transaction on Information Theory, 6(22), 1976, pp.644-654.

DOI: 10.1109/tit.1976.1055638

Google Scholar

[8] Kohnfelder L M. towards a Practical Public-key Cryptosystem. MIT B.S. Thesis, MIT Department of Electrical Engineering, (1978).

Google Scholar

[9] Chang C, Lin C. An ID-based Signature Scheme Based upon Rabin's Public Key Cryptosystem. Proceedings of 25th Annual IEEE International Carnahan Conference on Security Technology, 1991, pp.139-141.

DOI: 10.1109/ccst.1991.202205

Google Scholar

[10] Yang Yixian, Niu Xinxin. Application of cryptography. Beijing University of Posts and Telecommunications press, (2005).

Google Scholar