[1]周彩秋,杨余旺,刘建利,等.基于可信度的物联网门限证明方案[J].南京理工大学学报(自然科学版),2018,42(03):317.[doi:10.14177/j.cnki.32-1397n.2018.42.03.009]
 Zhou Caiqiu,Yang Yuwang,Liu Jianli,et al.Threshold attestation scheme for internet of thingsbased on trust value[J].Journal of Nanjing University of Science and Technology,2018,42(03):317.[doi:10.14177/j.cnki.32-1397n.2018.42.03.009]
点击复制

基于可信度的物联网门限证明方案()
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
42卷
期数:
2018年03期
页码:
317
栏目:
出版日期:
2018-06-30

文章信息/Info

Title:
Threshold attestation scheme for internet of things based on trust value
文章编号:
1005-9830(2018)03-0317-05
作者:
周彩秋1杨余旺1刘建利2宁振虎2李猛坤3
1.南京理工大学 计算机科学与工程学院,江苏 南京 210094; 2.北京工业大学 信息学部,北京 100124; 3.首都师范大学 管理学院,北京 100048
Author(s):
Zhou Caiqiu1Yang Yuwang1Liu Jianli2Ning Zhenhu2Li Mengkun3
1.School of Computer Science and Engineering,Nanjing University of Science and Technology, Nanjing 210094,China; 2.Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China; 3.School of Management,Capital Normal University,
关键词:
物联网 门限证明 可信度 节点
Keywords:
internet of things threshold attestation trust value nodes
分类号:
TP309.2
DOI:
10.14177/j.cnki.32-1397n.2018.42.03.009
摘要:
为了提高物联网节点可信证明的效率,提出了多个节点共同完成基于可信度的物联网门限签名的方法。当参与签名的物联网节点的可信度之和大于或等于阈值时,节点在证明中起的作用变大,反之则变小。安全分析和实例验证表明,该文方案可以抵御任意成员可信度之和小于阈值的成员的合谋攻击,在保证物联网安全性的同时,可以有效降低物联网节点的负担。
Abstract:
A threshold signature scheme completed by multiple nodes of the internet of things(IoT)is proposed based on credibility to improve the efficiency of trustworthiness certification. When the sum of the creditability of the nodes participating in the signature is greater than the threshold value or equal,the role of the node playing in the proof is greater; on the contrary is smaller. The security analysis and example verification show that,the proposed scheme can resist the conspiracy attack of any node when the sum of the creditability of the nodes participating in the attack is smaller than the threshold value,and can reduce the burden of the IOT nodes effectively while ensuring the security.

参考文献/References:

[1] Roman R,Zhou Jianying, Lopez J. On the features and challenges of security and privacy in distributed internet of things[J]. Computer Networks:The International Journal of Computer and Telecommunications Networking,2013,57(10):2266-2279. [2]徐小涛,杨志红. 物联网信息安全[M]. 北京:人民邮电出版社,2012. [3]付嵘. 物联网共享平台中安全隐私保护的研究与实现[D]. 北京:北京交通大学计算机与信息技术学院,2011. [4]刘刚,张宏,李千目. 基于博弈模型的网络安全最优攻防决策方法[J]. 南京理工大学学报,2014,38(1):13-21. Liu Gang,Zhang Hong,Li Qianmu. Network security optimal attack and defense decision-making method based on game model[J]. Journal of Nanjing University of Science and Technology,2014,38(1):13-21. [5]宁振虎. 物联网感知层可信关键技术研究[D]. 北京:北京工业大学软件学院,2016. [6]Gong Bei,Zhang Yu,Wang Yubo. A remote attestation mechanism for the sensing layer nodes of the internet of things[J]. Future Generation Computer Systems,2018,78(3):867-886. [7]Desmedt Y G,Frankel Y. Threshold cryptosystems[C]//Proceedings on Advances in Cryptology. Santa Barbara,California,USA:Springer-Verlag New York,Inc.,1989:307-315. [8]Desmedt Y,Frankel Y.Shared generation of authenticators and signatures[C]//Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology. London,UK:Springer-Verlag,1991:457-469. [9]De Santis A,Desmedt Y,Frankel Y,et al. How to share a function securely[C]//Proceedings of the Twenty-sixth Annual ACM Symposium on Theory of Computing. New York,NY,USA:ACM,1994:522-533. [10]Gennaro R,Jarecki S,Krawczyk H,et al. Robust threshold DSS signatures[J]. Information and Computation,2001,164(1):54-84. [11]Shamir A. How to share a secret[J]. Communications of the ACM,1979,22( 11):612-613. [12]Wang C T,Lin C H,Chang C C. Threshold signature schemes with traceable signers in group communi-cations[J]. Computer Communications,1998,21(8):771-776. [13]Pedersen T P. A threshold cryptosystem without a trusted party[C]//Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques. Berlin,Germany:Springer-Verlag Berlin,Heidelberg,1991:522-526. [14]邱卫东,黄征,李祥学,等. 密码协议基础[M]. 北京:高等教育出版社,2009. [15]冯登国. 安全协议:理论与实践[M]. 北京:清华大学出版社,2011. [16]Chen Weidong,Feng Dengguo. A group of threshold group-signature schemes with privilege subsets[J]. Journal of Software,2005,16(7):1289-1295. [17]黄东平,刘铎,戴一奇. 加权门限秘密共享[J]. 计算机研究与发展,2007,44(8):1378-1382. Huang Dongping,Liu Duo,Dai Yiqi. Research and development of weighted threshold secret sharing[J]. Journal of Computer Research and Development,2007,44(8):1378-1382. [18]王静,刘焕平. 加权门限秘密共享方案[J]. 哈尔滨师范大学自然科学学报,2011,27(3):23-25. Wang Jing,Liu Huanping. Weighted threshold secret sharing scheme[J]. Natural Science Journal of Harbin Normal University,2011,27(3),23-25. [19]郭成,张真诚,秦川,等.具有加权特写的门限认证加密机制[J].应用科学学报,2012,30(3):251-155. Guo Cheng,Zhang Zhencheng,Qin Chuan,et al. Encryption scheme for weighted threshold authentication[J]. Journal of Applied Science,2012,30(3):251-155. [20]Drgan C C, iplea L F. Distributive weighted threshold secret sharing schemes[J]. Information Sciences,2016,339:85-97.

相似文献/References:

[1]汪峥,钱焕延,汪婧雅,等.基于速度分治的车载物联网良性蠕虫模型[J].南京理工大学学报(自然科学版),2012,36(01):43.
 WANG Zheng,QIAN Huan-yan,WANG Jing-ya,et al.New Anti-worm Model in Vehicular Internet of Things Based on Divide-and-conquer with Velocity[J].Journal of Nanjing University of Science and Technology,2012,36(03):43.
[2]王晓菊,田立勤,赵竞雄.基于物联网的用户行为认证机制与分析[J].南京理工大学学报(自然科学版),2015,39(01):70.
 Wang Xiaoju,Tian Liqin,Zhao Jingxiong.User behavioral authentication mechanism and analysis based on IOT[J].Journal of Nanjing University of Science and Technology,2015,39(03):70.

备注/Memo

备注/Memo:
收稿日期:2018-05-04 修回日期:2018-05-23 基金项目:国家自然科学基金(61671244); 北京市教育委员会科技计划项目(KM201510028019) 作者简介:周彩秋(1982-),女,博士生,主要研究方向:物联网安全,E-mail:zhoucaiqiu@163.com; 通讯作者:杨余旺(1966-),男,博士,教授,主要研究方向:网络编码、网络安全、大数据,E-mail:yuwangyang@njust.edu.cn。 引文格式:周彩秋,杨余旺,刘建利,等. 基于可信度的物联网门限证明方案[J]. 南京理工大学学报,2018,42(3):317-321. 投稿网址:http://zrxuebao.njust.edu.cn
更新日期/Last Update: 2018-06-30