首页 | 本学科首页   官方微博 | 高级检索  
     

T-NTRU物联网动态接入认证技术
引用本文:李兴华,蔡觉平,李晓龙,王峰,闫振华. T-NTRU物联网动态接入认证技术[J]. 西安电子科技大学学报(自然科学版), 2021, 48(3): 188-196. DOI: 10.19665/j.issn1001-2400.2021.03.023
作者姓名:李兴华  蔡觉平  李晓龙  王峰  闫振华
摘    要:物联网终端安全接入认证是保证电力物联网大规模建设的关键性技术.传统认证方案通常采用的椭圆曲线密码算法,计算量大,不能抵抗量子攻击.数论研究单元算法可以抵抗量子攻击,与椭圆曲线密码采用点乘算法相比,计算速度快.因此提出了一种时间变换数论研究单元算法物联网动态安全接入认证算法,使用动态变化时间序列通过哈希函数产生动态密钥,...

关 键 词:物联网  数论研究单元算法  安全认证
收稿时间:2020-10-13

T-NTRU IoT dynamic access authentication technology
LI Xinghua,CAI Jueping,LI Xiaolong,WANG Feng,YAN Zhenhua. T-NTRU IoT dynamic access authentication technology[J]. Journal of Xidian University, 2021, 48(3): 188-196. DOI: 10.19665/j.issn1001-2400.2021.03.023
Authors:LI Xinghua  CAI Jueping  LI Xiaolong  WANG Feng  YAN Zhenhua
Affiliation:1. Scientific Research Institute of State Grid Ningxia Electric Power Company,Yinchuan 750001,China;2. School of Microelectronics,Xidian University,Xi’an 710071,China
Abstract:The secure access authentication of the Internet of the things terminal is the key technology to ensure the large-scale construction of the power Internet of things.The elliptic curve cryptography (ECC) algorithm is usually used in the transmission authentication scheme,and it requires a large amount of calculation.Furthermore it is proved that its security against quantum attacks is poor.The number theory research unit (NTRU) algorithm can resist quantum attacks,and its computational speed is faster than that of the ECC.This paper proposes a dynamic T-NTRU secure access authentication algorithm based on time information in the Internet of things.It uses the dynamic changing time series as the secret key of the hash function to solve the internal attack security problem caused by the fixed hash function.Experiments are carried out on the computer and single chip microcomputer,respectively.Experimental results show that compared with the traditional ECC calculation,the T-NTRU algorithm proposed in this paper reduces about 97% of the calculational amount,which is equivalent to the typical NTRU algorithm,and is suitable for the need of the resource constrained power IOT network application.
Keywords:power iot network  number theory reseach unit  secure access protocol  
点击此处可从《西安电子科技大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《西安电子科技大学学报(自然科学版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号