物联网安全与隐私问题探究.doc
约46页DOC格式手机打开展开
物联网安全与隐私问题探究,2.88万字我自己的毕业论文,原创的,已经通过校内系统检测,仅在本站独家出售,重复率低,大家放心下载使用摘要 物联网(internet of things)被预言为继互联网之后全球信息产业的又一次科技与经济浪潮,受到各国政府、企业和学术界的重视,美国、欧盟、日本等甚至将其纳入国家和区域信息化战略...
内容介绍
此文档由会员 淘宝大梦 发布
物联网安全与隐私问题探究
2.88万字
我自己的毕业论文,原创的,已经通过校内系统检测,仅在本站独家出售,重复率低,大家放心下载使用
摘要 物联网(Internet of Things)被预言为继互联网之后全球信息产业的又一次科技与经济浪潮,受到各国政府、企业和学术界的重视,美国、欧盟、日本等甚至将其纳入国家和区域信息化战略。我国早在99年就启动了物联网核心传感网技术研究,发展物联网也早已提升到国家战略的高度。随着物联网的逐渐普及与实际应用,其在带来方便快捷的同时,安全与隐私问题也越来越引起人们的关注,甚至能左右各个国家的战略地位,该问题的重要性不言而喻。
从物联网的信息处理过程来看,感知信息经过采集、汇聚、融合、传输、决策与控制等过程,整个信息处理的过程体现了物联网安全的特征与要求,也揭示了所面临的安全问题。一是感知网络的信息采集、传输与信息安全问题。二是核心网络的传输与信息安全问题。三是物联网业务的安全问题。本文根据物联网安全特征,重点分析了感知网络信息采集,传输的过程所存在的安全问题,并提出了相应的安全策略。
RFID(射频识别系统)作为物品传递自身信息的途径,是一种高级的非接触式识别技术。它具有其优于传统条码的几个特性,一是无需“可视”读取,实现远距离自动识别,避免了人工干预,特别是在恶劣环境条件下。二是兼可识别静比、运动的物品。三是能够同时识别多个标签,提高识别效率。作为物联网的重要组成部分,其安全问题也是物联网安全问题的一部分。本文分析了RFID的结构与工作原理,对RFID所面临的安全问题进行深入探究。
本文列出了几种比较流行的密码体制,也分析了其特点。为了解决RFID系统的安全和成本问题,本文提出了一种基于超椭圆曲线密码体制的RFID安全协议。利用新的签密算法,在RFID阅读器和电子标签之间实现了信息的加密和认证。与现有的签密算法比较,该协议具有前向安全和可公开验证,能避免恶意信息的攻击。协议的安全性和性能分析结果表明,该协议达到了RFID系统高隐私安全和低标签成本的结合。
关键词:物联网 安全 RFID 超椭圆曲线密码体制
Security and Privacy Issues of the Internet of Things
Abstract IOT (Internet of Things) is predicted to continue another wave of the global information technology industry and economy after the Internet, also be much accounted of governments, enterprises and academic. The United States, European Union, Japan, and even bring it into their national and regional information strategy. In the early 1999, our country started the physical sensor network research core networking technologies, the development of things have long been elevated to the national strategy. With the increasing popularity and the practical application of things, which brings convenience at the same time, security and privacy issues are increasingly a cause for concern, even about each country's strategic position, the importance of the problem is self-evident.
Things from the information processing point of view, the perception of information through the collection, aggregation, integration, transmission, and other decision-making and control process, the whole process of information processing in networking security reflects the characteristics and requirements, but also reveals the security problems faced by . The first one is perception of information collection, transmission network and information security problems. The second one is transmission and core network information security problems. The third one is security networking business. Based on the security features of things, analyzes the security-aware network information collection, transmission of the existence of the process, and the corresponding security policy.
RFID (radio frequency identification system) as the goods pass its own way of information, is an advanced non-contact identification technology. It is superior to the conventional bar code has its several features, one without "visible" Read achieve remote automatic recognition to avoid manual intervention, especially in harsh environmental conditions. Secondly is can recognizable items whet. Thirdly is can simultaneously identify multiple tags, to improve recognition efficiency. As an important part of things, its security issues are also part of the security issues of things. This paper analyzes the structure and working principle of RFID, RFID security issues faced by in-depth inquiry.
This article lists some of the popular cryptosystem and analyzes the characteristics.To solve cost and security problems of RFID system,an RFID security protocol based on hyperelliptic curve cryptosystem is proposed. The protocol realizes encryption and certification of data between RFID tag and reader by using new signcryption. The new protocol has the capability of forward secrecy and public verifiability and avoids the attack of evil information compared with the exciting signcryption. The security and performance of the protocol is analyzed, results prove that the new protocol achieves the integration of low tag cost and high security of RFID system.
Key words:Internet of things Security RFID Hyperelliptic curve cryptosystem
目 录
第一章 绪论 6
1.1物联网安全与隐私课题研究的相关内容和意义 6
1.2物联网国内外研究发展现状 8
1.3本篇文章的主要研究内容与组织结构 11
第二..
2.88万字
我自己的毕业论文,原创的,已经通过校内系统检测,仅在本站独家出售,重复率低,大家放心下载使用
摘要 物联网(Internet of Things)被预言为继互联网之后全球信息产业的又一次科技与经济浪潮,受到各国政府、企业和学术界的重视,美国、欧盟、日本等甚至将其纳入国家和区域信息化战略。我国早在99年就启动了物联网核心传感网技术研究,发展物联网也早已提升到国家战略的高度。随着物联网的逐渐普及与实际应用,其在带来方便快捷的同时,安全与隐私问题也越来越引起人们的关注,甚至能左右各个国家的战略地位,该问题的重要性不言而喻。
从物联网的信息处理过程来看,感知信息经过采集、汇聚、融合、传输、决策与控制等过程,整个信息处理的过程体现了物联网安全的特征与要求,也揭示了所面临的安全问题。一是感知网络的信息采集、传输与信息安全问题。二是核心网络的传输与信息安全问题。三是物联网业务的安全问题。本文根据物联网安全特征,重点分析了感知网络信息采集,传输的过程所存在的安全问题,并提出了相应的安全策略。
RFID(射频识别系统)作为物品传递自身信息的途径,是一种高级的非接触式识别技术。它具有其优于传统条码的几个特性,一是无需“可视”读取,实现远距离自动识别,避免了人工干预,特别是在恶劣环境条件下。二是兼可识别静比、运动的物品。三是能够同时识别多个标签,提高识别效率。作为物联网的重要组成部分,其安全问题也是物联网安全问题的一部分。本文分析了RFID的结构与工作原理,对RFID所面临的安全问题进行深入探究。
本文列出了几种比较流行的密码体制,也分析了其特点。为了解决RFID系统的安全和成本问题,本文提出了一种基于超椭圆曲线密码体制的RFID安全协议。利用新的签密算法,在RFID阅读器和电子标签之间实现了信息的加密和认证。与现有的签密算法比较,该协议具有前向安全和可公开验证,能避免恶意信息的攻击。协议的安全性和性能分析结果表明,该协议达到了RFID系统高隐私安全和低标签成本的结合。
关键词:物联网 安全 RFID 超椭圆曲线密码体制
Security and Privacy Issues of the Internet of Things
Abstract IOT (Internet of Things) is predicted to continue another wave of the global information technology industry and economy after the Internet, also be much accounted of governments, enterprises and academic. The United States, European Union, Japan, and even bring it into their national and regional information strategy. In the early 1999, our country started the physical sensor network research core networking technologies, the development of things have long been elevated to the national strategy. With the increasing popularity and the practical application of things, which brings convenience at the same time, security and privacy issues are increasingly a cause for concern, even about each country's strategic position, the importance of the problem is self-evident.
Things from the information processing point of view, the perception of information through the collection, aggregation, integration, transmission, and other decision-making and control process, the whole process of information processing in networking security reflects the characteristics and requirements, but also reveals the security problems faced by . The first one is perception of information collection, transmission network and information security problems. The second one is transmission and core network information security problems. The third one is security networking business. Based on the security features of things, analyzes the security-aware network information collection, transmission of the existence of the process, and the corresponding security policy.
RFID (radio frequency identification system) as the goods pass its own way of information, is an advanced non-contact identification technology. It is superior to the conventional bar code has its several features, one without "visible" Read achieve remote automatic recognition to avoid manual intervention, especially in harsh environmental conditions. Secondly is can recognizable items whet. Thirdly is can simultaneously identify multiple tags, to improve recognition efficiency. As an important part of things, its security issues are also part of the security issues of things. This paper analyzes the structure and working principle of RFID, RFID security issues faced by in-depth inquiry.
This article lists some of the popular cryptosystem and analyzes the characteristics.To solve cost and security problems of RFID system,an RFID security protocol based on hyperelliptic curve cryptosystem is proposed. The protocol realizes encryption and certification of data between RFID tag and reader by using new signcryption. The new protocol has the capability of forward secrecy and public verifiability and avoids the attack of evil information compared with the exciting signcryption. The security and performance of the protocol is analyzed, results prove that the new protocol achieves the integration of low tag cost and high security of RFID system.
Key words:Internet of things Security RFID Hyperelliptic curve cryptosystem
目 录
第一章 绪论 6
1.1物联网安全与隐私课题研究的相关内容和意义 6
1.2物联网国内外研究发展现状 8
1.3本篇文章的主要研究内容与组织结构 11
第二..