通信学报 ›› 2020, Vol. 41 ›› Issue (7): 213-222.doi: 10.11959/j.issn.1000-436x.2020131

• 学术通信 • 上一篇    

物联网中认证技术研究

闫宏强1,2,王琳杰3,4()   

  1. 1 中国科学院计算机网络信息中心,北京 100190
    2 中国科学院大学,北京 100049
    3 铜仁学院大数据学院,贵州 铜仁 554300
    4 贵州大学计算机科学与技术学院,贵州 贵阳 550025
  • 修回日期:2020-05-26 出版日期:2020-07-25 发布日期:2020-08-01
  • 作者简介:闫宏强(1972- ),男,河北卢龙人,中国科学院博士生,主要研究方向为个人信息与隐私保护|王琳杰(1981- ),男,山东平度人,贵州大学博士生,主要研究方向为网络与信息安全
  • 基金资助:
    国家自然科学基金资助项目(61962009);国家自然科学基金资助项目(61662009)

Research of authentication techniques for the Internet of things

Hongqiang YAN1,2,Linjie WANG3,4()   

  1. 1 Computer Network Information Center,Chinese Academy of Sciences,Beijing 100190,China
    2 University of Chinese Academy of Sciences,Beijing 100049,China
    3 School of Data Science,Tongren University,Tongren 554300,China
    4 State Key Laboratory of Public Big Data,College of Computer Science Technology,Guizhou University,Guiyang 550025,China
  • Revised:2020-05-26 Online:2020-07-25 Published:2020-08-01
  • Supported by:
    The National Natural Science Foundation of China(61962009);The National Natural Science Foundation of China(61662009)

摘要:

物联网认证技术是物联网安全领域的关键技术,它确保接入物联网的用户和设备节点身份信息的真实性。由于物联网设备的低成本、低功耗、小存储和网络的异构性等特点,使传统计算机网络中的身份认证机制往往无法适用。首先介绍了物联网发展历程,分析了物联网安全风险和认证工作面临的挑战,着重比较了5种典型的认证协议的优缺点,进而对 RFID、智能电网、车联网、智能家居等几种实践场景下的认证技术进行总结和对比分析。最后,讨论了未来物联网认证技术的研究方向。

关键词: 物联网, 认证技术, 轻量级协议, 安全认证

Abstract:

Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT.Due to the low cost,low power consumption,small storage of IoT devices and heterogeneity of IoT network,the identity authentication mechanisms in traditional computer networks are often not applicable.Firstly,the development process of IoT was introduced,the security risks of IoT and the challenges faced by the authentication work were analyzed.Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols.Moreover,the authentication technologies in several practical scenarios of RFID,smart grid,Internet of vehicles,and smart home were summarized and analyzed.Finally,the future research direction was discussed.

Key words: IoT, authentication technique, light-weight protocol, secure authentication

中图分类号: 

No Suggested Reading articles found!