Security Architecture on the Trusting Internet of Things

被引:6
作者
Bing Zhang
机构
关键词
Combined public key; elliptic curves cryptography; Internet of Things; radio frequency identification; security system; trusting system;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
By analyzing existed Internet of Things’ system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes’ validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes’ authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided.
引用
收藏
页码:364 / 367
页数:4
相关论文
共 2 条
  • [1] Identities in the Future Internet of Things
    Sarma, Amardeo C.
    Girao, Joao
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2009, 49 (03) : 353 - 363
  • [2] The government work report in 2010. http://www.china.com.cn/policy/txt/2010-03/15/content1961 23728.htm .