浏览全部资源
扫码关注微信
1. 中国科学院计算机网络信息中心,北京 100190
2. 中国科学院大学,北京 100049
3. 铜仁学院大数据学院,贵州 铜仁 554300
4. 贵州大学计算机科学与技术学院,贵州 贵阳 550025
[ "闫宏强(1972- ),男,河北卢龙人,中国科学院博士生,主要研究方向为个人信息与隐私保护" ]
[ "王琳杰(1981- ),男,山东平度人,贵州大学博士生,主要研究方向为网络与信息安全" ]
网络出版日期:2020-07,
纸质出版日期:2020-07-25
移动端阅览
闫宏强, 王琳杰. 物联网中认证技术研究[J]. 通信学报, 2020,41(7):213-222.
Hongqiang YAN, Linjie WANG. Research of authentication techniques for the Internet of things[J]. Journal on communications, 2020, 41(7): 213-222.
闫宏强, 王琳杰. 物联网中认证技术研究[J]. 通信学报, 2020,41(7):213-222. DOI: 10.11959/j.issn.1000-436x.2020131.
Hongqiang YAN, Linjie WANG. Research of authentication techniques for the Internet of things[J]. Journal on communications, 2020, 41(7): 213-222. DOI: 10.11959/j.issn.1000-436x.2020131.
物联网认证技术是物联网安全领域的关键技术,它确保接入物联网的用户和设备节点身份信息的真实性。由于物联网设备的低成本、低功耗、小存储和网络的异构性等特点,使传统计算机网络中的身份认证机制往往无法适用。首先介绍了物联网发展历程,分析了物联网安全风险和认证工作面临的挑战,着重比较了5种典型的认证协议的优缺点,进而对 RFID、智能电网、车联网、智能家居等几种实践场景下的认证技术进行总结和对比分析。最后,讨论了未来物联网认证技术的研究方向。
Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost
low power consumption
small storage of IoT devices and heterogeneity of IoT network
the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly
the development process of IoT was introduced
the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover
the authentication technologies in several practical scenarios of RFID
smart grid
Internet of vehicles
and smart home were summarized and analyzed.Finally
the future research direction was discussed.
GUBBI J , BUYYA R , MARUSIC S , et al . Internet of things (IoT):a vision,architectural elements,and future directions [J ] . Future Generation Computer Systems , 2013 , 29 ( 7 ): 1645 - 1660 .
EL-HAJJ M , CHAMOUN M , FADLALLAH A , et al . Analysis of authentication techniques in Internet of things (IoT) [C ] // In Proceedings of the 2017 1st Cyber Security in Networking Conference . Piscataway:IEEE Press , 2017 : 1 - 3 .
EL-HAJJ M , CHAMOUN M , FADLALLAH A , et al . Taxonomy of authentication techniques in Internet of things (IoT) [C ] // IEEE 15th Student Conference on Research and Development . Piscataway:IEEE Press , 2017 : 67 - 71 .
思科 . 2020年全球网络趋势 [R ] .(2019-10-24)[2020-03-20 ] .
CISCO . 2019 networking report [R ] .(2019-10-24)[2020-03-20 ] .
BUGHIN J , CHUI M , MANYIKA J . An executive’s guide to the Internet of things [J ] . McKinsey Quart , 2015 ( 4 ): 92 - 101 .
McKinsey & Company . The Internet of things:mapping the value beyond the hype [R ] .(2015-06-01)[2020-03-20 ] .
MARESCH D , GARTNER J . Make disruptive technological change happen—the case of additive manufacturing [J ] . Technological Forecasting and Social Change , 2018 ,doi:10.1016/j.techfore.2018.02.009.
HERNANDEZ G , ARIAS O , BUENTELLO D , et al . Smart nest thermostat:a smart spy in your home-black hat [R ] .(2014-08)[2020-03-20 ] .
TRAPPE W , HOWARD R , MOORE R S . Low-energy security:limits and opportunities in the Internet of things [J ] . IEEE Security Privacy , 2015 ( 13 ): 14 - 21 .
AHMED M E , KIM H . DDoS attack mitigation in Internet of things using software defined networking [C ] // IEEE Third International Conference on Big Data Computing Service and Applications (Big Data Service) . Piscataway:IEEE Press , 2017 : 271 - 276 .
McAfee . McAfee labs threats report [R ] .(2017-06)[2020-03-20 ] .
PANARELLO A , TAPAS N , MERLINO G , et al . Blockchain and IoT integration:a systematic survey [J ] . Sensors , 2018 , 18 ( 8 ): 25 - 75 .
WAZID M , DAS A K , ODELU V , et al . Secure remote user authenticated key establishment protocol for smart home environment [J ] . IEEE Transactions on Dependable and Secure Computing , 2020 , 17 ( 2 ): 391 - 406 .
BERTINO E , ISLAM N . Botnets and Internet of things security [J ] . Computer , 2017 , 50 ( 2 ): 76 - 79 .
YANG Y , PENG H , LI L , et al . General theory of security and a study case in Internet of things [J ] . IEEE Internet Things Journal , 2017 , 4 ( 2 ): 592 - 600 .
GUPTA A , TRIPATHI M . Poster:a lightweight mutually authenticated key-agreement scheme for wireless body area networks in Internet of things environment [C ] // Proceedings of the 24th Annual International Conference on Mobile Computing and Networking . Piscataway:IEEE Press , 2018 : 804 - 806 .
GOPE P , AMIN R , HAFIZUL ISLAM S K , et al . Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment [J ] . Future Generation Computer Systems , 2018 ( 83 ): 29 - 37 .
KUMARI S , M KARUPPIAH , DAS A K , et al . A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers [J ] . Journal of Supercomputing , 2018 ( 74 ): 6428 - 6453 .
NANDY T , IDRIS I B , NOOR R M , et al . Review on security of Internet of things authentication mechanism [J ] . IEEE Access , 2019 ,( 7 ): 151054 - 151089 .
ATWADY Y , HAMMOUDEH M . A survey on authentication techniques for the Internet of things [C ] // 2019 International Conference on Computer and Information Sciences . Piscataway:IEEE Press , 2019 : 1 - 5 .
HOSSAIN M M , FOTOUHI M , HASAN R . Towards an analysis of security issues,challenges,and open problems in the Internet of things [C ] // IEEE World Congress on Services . Piscataway:IEEE Press , 2015 : 21 - 28 .
EL-HAJJ M , FADLALLAH A , CHAMOUN M , et al . A survey of Internet of things (IoT) authentication schemes [J ] . Sensors , 2019 ( 19 ): 1 - 43 .
HONG S . Authentication techniques in the Internet of things environment:a survey [J ] . International Journal of Network Security , 2019 , 21 ( 3 ): 462 - 470 .
HONG S . P2P networking based Internet of things (IoT) sensor node authentication by blockchain [J ] . Peer-to-Peer Networking and Applications , 2020 ( 13 ): 579 - 589 .
LETSOALO E , OJO S . Survey of media access control address spoofing attacks detection and prevention techniques in wireless networks [C ] // IST-Africa Week Conference.[S.n.:s.l] . 2016 : 1 - 10 .
LEE J Y , LIN W C , HUANG Y H . A lightweight authentication protocol for Internet of things [C ] // 2014 International Symposium on Next-Generation Electronics . Piscataway:IEEE Press , 2014 : 1 - 2 .
FAN K , GONG Y , LIANG C , et al . Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G [J ] . Security and Communication Networks , 2016 ( 9 ): 3095 - 3104 .
LI H , LU R , ZHOU L , et al . An efficient merkle-tree-based authentication scheme for smart grid [J ] . IEEE Systems Journal , 2014 ( 8 ): 655 - 663 .
CHIM T , YIU S , HUI L C , et al . PASS:privacy-preserving authentication scheme for smart grid network [C ] // 2011 IEEE International Conference on Smart Grid Communications . Piscataway:IEEE Press , 2011 : 196 - 201 .
FOUDA M M , FADLULLAH Z M , KATO N , et al . Towards a light-weight message authentication mechanism tailored for Smart Grid communications [C ] // 2011 IEEE Conference on Computer Communications Workshops . Piscataway:IEEE Press , 2011 : 1018 - 1023 .
MAHMOOD K , CHAUDHRY S A , NAQVI H , et al . A lightweight message authentication scheme for Smart Grid communications in power sector [J ] . Computers & Electrical Engineering , 2016 ( 52 ): 114 - 124 .
JI C , KIM J , LEE J Y , et al . Review of one-time signatures for multicast authentication in smart grid [C ] // 2015 12th International Conference & Expo on Emerging Technologies for a Smarter World . Piscataway:IEEE Press , 2015 : 1 - 4 .
CHIM T W , YIU S M , LI V O , et al . PRGA:privacy-preserving recording & gateway-assisted authentication of power usage information for smart grid [J ] . IEEE Transactions on Dependable and Secure Computing , 2015 ( 12 ): 85 - 97 .
LI Q , CAO G . Multicast authentication in the smart grid with one-time signature [J ] . IEEE Transactions Smart Grid , 2011 ( 2 ): 686 - 696 .
LIN X , LI X . Achieving efficient cooperative message authentication in vehicular Ad Hoc networks [J ] . IEEE Transactions on Vehicular Technology , 2013 , 62 ( 7 ): 3339 - 3348 .
JIANG S , ZHU X , WANG L . A conditional privacy scheme based on anonymized batch authentication in vehicular Ad Hoc networks [C ] // IEEE Wireless Communications and Networking Conference . Piscataway:IEEE Press , 2013 : 2375 - 2380 .
CHEON J , YI J . Fast batch verification of multiple signatures [C ] // Public Key Cryptography-PKC . Berlin:Springer , 2007 : 442 - 457 .
MIETTINEN M , NGUYEN T D , SADEGHI A , et al . Revisiting context-based authentication in IoT [C ] // 55th ACM/ESDA/IEEE Design Automation Conference . Piscataway:IEEE Press , 2018 : 1 - 6 .
SUN X , MEN S , ZHAO C , et al . A security authentication scheme in machine-to-machine home network service [J ] . Security and Communication Networks , 2012 ( 8 ): 2678 - 2686 .
JAN M A , KKAN F , ALAM M , et al . A payload-based mutual authentication scheme for Internet of things [J ] . Future Generation Computer Systems , 2019 ( 92 ): 1028 - 1039 .
XU H , DING J , LI P , et al . A lightweight RFID mutual authentication protocol based on physical unclonable function [J ] . Sensors , 2018 , 18 ( 3 ):760.
GOPE P , LEE J , QUEK T Q S . Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions [J ] . IEEE Transactions on Information Forensics and Security , 2018 ( 13 ): 2831 - 2843 .
FAN K , SONG P , YANG Y . ULMAP:ultralightweight NFC mutual authentication protocol with pseudonyms in the tag for IoT in 5G [J ] . Mobile Information Systems , 2017 : 1 - 7 .
NICANFAR H , JOKAR P , BEZNOSOV K , et al . Efficient authentication and key management mechanisms for smart grid communications [J ] . IEEE Systems Journal , 2014 , 8 ( 2 ): 629 - 640 .
ZHANG L , WU Q , DOMINGO-FERRER J , et al . Distributed aggregate privacy-preserving authentication in VANETs [J ] . IEEE Transactions on Intelligent Transportation Systems , 2017 ( 18 ): 516 - 526 .
LALLI M , GRAPHY G.S . Prediction based dual authentication model for VANET [C ] // 2017 International Conference on Computing Methodologies and Communication . Piscataway:IEEE Press , 2017 : 693 - 699 .
REKIK M , MEDDEB-MAKHLOUF A , ZARAI F , et al . Improved dual authentication and key management techniques in vehicular Ad Hoc networks [C ] // IEEE/ACS 14th International Conference on Computer Systems and Applications . Piscataway:IEEE Press , 2017 : 1133 - 1140 .
KUMAR A , PRAKASH A , SHARMA S , et al . Vehicle authentication and message hiding protocol for vehicle to vehicle communication [C ] // 2015 1st International Conference on Next Generation Computing Technologies . Piscataway:IEEE Press , 2015 : 383 - 387 .
CESPEDES S , TAHA S , SHEN X . A multihop-authenticated proxy mobile ip scheme for asymmetric VANETs [J ] . IEEE Transactions on Vehicular Technology , 2013 ( 62 ): 3271 - 3286 .
HUTH C , ZIBUSCHKA J , DUPLYS P , et al . Securing systems on the Internet of things via physical properties of devices and communications [C ] // Proceedings of 2015 Annual IEEE Systems Conference . Piscataway:IEEE Press , 2015 : 8 - 13 .
ZHAO M , YAO X , LIU H , et al . Physical unclonable function based authentication protocol for unit IoT and ubiquitous IoT [C ] // 2016 International Conference on Identification,Information and Knowledge in the Internet of Things . Piscataway:IEEE Press , 2016 : 179 - 184 .
MUHAL M A , LUO X , MAHMOO Z , et al . Physical unclonable function based authentication scheme for smart devices in Internet of things [C ] // IEEE International Conference on Smart Internet of Things . Piscataway:IEEE Press , 2018 : 160 - 165 .
KHAN M A , SALAH K . IoT security:review,blockchain solutions,and open challenges [J ] . Future Generation Computer Systems , 2018 ( 82 ): 395 - 411 .
沈昌祥 . 用可信计算 3.0 为网络安全筑牢免疫系统 [J ] .(2019-08-21)[2020-03-20 ] .
SHEN C X . Using trusted computing 3.0 to build an immune system for network security [R ] .(2019-08-21)[2020-03-20 ] .
YANF T , ZHANG G H , LIU L , et al . New features of authentication scheme for the IoT:a survey [C ] // 2nd Workshop on the Internet of Things Security and Privacy . New York:ACM Press , 2019 : 44 - 49 .
0
浏览量
490
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构