首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things
【2h】

Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things

机译:安全的路线 - 混淆机制具有信息的信息 - 理论安全

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

As accessibility of networked devices becomes more and more ubiquitous, groundbreaking applications of the Internet of Things (IoT) find their place in many aspects of our society. The exploitation of these devices is the main reason for the cyberattacks in IoT networks. Security design is still an open problem and a crucial step in making IoT applications successful. In dicey environments, such as e-health, smart grid, and smart cities, real-time commands must reach the end devices in the scale of milliseconds. Traditional public-key cryptosystem, albeit necessary in the context of general Internet security, falls short in establishing new session keys in the scale of milliseconds for critical messages. In this paper, a systematic perspective for securing IoT communication, specifically satisfying the real-time constraint against certain adversaries in realistic settings. First, at the network layer, we propose a secret random route computation scheme using the software-defined network (SDN) based on a capability scheme using the network actions. The computed routes are random in the eyes of the eavesdropper. Second, at the application layer, the source breaks command messages into secret shares and sends them through the network to the destination. Only the legitimate destination device can reconstruct the command. The secret sharing scheme is efficient compared to PKI and comes with information-theoretic security against adversaries. Our proof formalizes the notion of security of the proposed scheme, and our simulations validate our design.
机译:由于网络设备的可访问性变得越来越普遍,互联网的互联网(IOT)的突破性应用(IOT)在我们社会的许多方面找到了他们的位置。这些设备的开发是IOT网络中的网络攻击的主要原因。安全设计仍然是一个开放问题,并且使IOT应用程序成功的重要阶跃。在冒险的环境中,例如电子健康,智能电网和智能城市,实时命令必须以毫秒为单位到达最终设备。传统的公钥密码系统,尽管在普通互联网安全性上下文中必要,但在为关键消息的规模中建立新的会话键时缺乏。在本文中,用于保护IOT通信的系统视角,特别是对现实环境中某些对手的实时约束来特异性地满足实际限制。首先,在网络层,我们提出了一种基于使用网络动作的能力方案的软件定义的网络(SDN)的秘密随机路线计算方案。计算的路线在窃听器的眼睛中随机。其次,在应用层,源将命令消息中断到秘密共享中,并通过网络将它们发送到目的地。只有合法的目标设备可以重建命令。与PKI相比,秘密共享方案是有效的,并借助对手的信息理论安全性。我们的证明正式确定了拟议方案的安全概念,我们的模拟验证了我们的设计。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号