首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--一般性问题论文--安全保密论文

U2IoT隐私保护研究

致谢第4-5页
摘要第5-7页
Abstract第7-8页
LIST OF NOTATIONS第14-16页
LIST OF ABBREVIATIONS第16-17页
CHAPTER 1 INTRODUCTION第17-36页
    1.1 INTERNET OF THING(IOT)ARCHITECTURE第18-20页
        1.1.1 IOT Edge Layer第19页
        1.1.2 Transmission Layer第19页
        1.1.3 Application Layer第19-20页
    1.2 UNIT AND UBIQUITOUS IOT(U2IOT)第20-21页
    1.3 INTERNET OF THING(IOT)APPLICATION第21-25页
        1.3.1 Smart Sensing第23页
        1.3.2 Radio-Frequency Identification (RFID)第23-24页
        1.3.3 Smart Devices Network第24页
        1.3.4 Smart Health第24-25页
        1.3.5 Smart Lift第25页
    1.4 SECURITY AND PRIVACY第25-27页
    1.5 IMPORTANCE OF DATA SECURITY AND USER PRIVACY IN IOT第27-29页
        1.5.1 Confidentiality:第27-28页
        1.5.2 Integrity第28页
        1.5.3 Availability第28页
        1.5.4 Identification and Authentication第28-29页
        1.5.5 Data Protection第29页
        1.5.6 Trust第29页
    1.6 BACKGROUND OF RESEARCH第29-30页
    1.7 SIGNIFICANCE OF RESEARCH第30-32页
    1.8 MOTIVATION第32页
    1.9 PROBLEM FORMULATION第32-34页
        1.9.1 Research Questions第33-34页
    1.10 OBJECTIVE第34-35页
    1.11 THESIS STRUCTURE第35-36页
CHAPTER 2 LITERATURE REVIEW第36-55页
    2.1 SECURE KEY MANAGEMENT & RESOURCE-CONSTRAINED NETWORK第36-40页
    2.2 SMART DEVICES BASED HETEROGENEOUS NETWORK DATA SECURITY第40-44页
        2.2.1 Password Authentication Based Schemes第41页
        2.2.2 Symmetric Key Authentication Schemes第41-42页
        2.2.3 One Node Failure and Efficiency Issues第42-43页
        2.2.4 Asymmetric Schemes第43-44页
    2.3 CHAOTIC MAP AND CHEBYSHEV POLYNOMIAL BASED SCHEMES第44-49页
        2.3.1 One Way Hash and Pseudorandom Function Groups第44页
        2.3.2 Symmetric Encryption第44-45页
        2.3.3 Chaotic Map-based Discrete Logarithm Problem (CMDLP)第45页
        2.3.4 Definition of Hard Problem of Chaotic Maps第45-46页
        2.3.5 Chaotic Map based Schemes第46-47页
        2.3.6 Chebyshev Polynomial and Smart System Security第47-49页
    2.4 SMART SYSTEM AND USER PRIVACY第49-52页
        2.4.1 User Anonymity and Data Privacy第50-51页
        2.4.2 Internet of Thing (IoT) based Healthcare System第51-52页
    2.5 DATA PRIVACY IN IOT BASD SMART SYSTEM第52-55页
        2.5.1 Lightweight Cryptographic Techniques for Smart System第52-53页
        2.5.2 Symmetric Secret Credentials Based Key Management for IoT第53-55页
CHAPTER 3 EFFICIENT KEYING FOR MULTI-PARTY SECURITY第55-80页
    3.1 BACKGROUND第55-56页
    3.2 NETWORK ARCHITECTURE第56-57页
    3.3 POLYNOMIAL BASED NODE AUTHENTICATION AND KEY MANAGEMENT第57-59页
    3.4 SYSTEM AND SECURITY MODEL第59-62页
        3.4.1 Threat Model第60页
        3.4.2 Adversarial Model第60-61页
        3.4.3 Potential Attacks第61-62页
    3.5 SYSTEM MODEL第62-70页
        3.5.1 Efficient Keying for Multi-Party Scheme (EKM)第63-65页
        3.5.2 Addition of New Node第65-67页
        3.5.3 Secure Node Migration第67-70页
    3.6 EKM FORMAL SPECIFICATION第70-73页
    3.7 RESULTS AND ANALYSIS第73-80页
        3.7.1 Computation Overheads第73-74页
        3.7.2 Latency Time第74-75页
        3.7.3 Communication Overhead第75-76页
        3.7.4 Storage Overhead第76-77页
        3.7.5 Energy Consumption第77-79页
        3.7.6 Summary第79-80页
CHAPTER 4 SECURE DISTRIBUTED MULTIPARTY KEYING(DMK)第80-108页
    4.1 BACKGROUND第80-83页
        4.1.1 Security Issues in Smart Devices Network第80-82页
        4.1.2 Chebyshev Chaotic Map第82页
        4.1.3 Preliminaries of Chebyshev Polynomial第82-83页
        4.1.4 Issues in Existing Password based Schemes第83页
    4.2 DISTRIBUTED MULTIPARTY KEY(DMK)第83-84页
    4.3 DISTRIBUTED MULTIPARTY KEY(DM K) ESTABLISHMENT SCHEME第84-96页
        4.3.1 Phase-Ⅰ: Authentication of Group Heads and Server第85-89页
        4.3.2 PhaseⅡ-Authentication between Groups Head and Member Nodes第89-93页
        4.3.3 Secure Inter-Group Key Establishment第93-96页
    4.4 FORMAL MODELING AND ANALYSIS OF MDK第96-99页
    4.5 SECURITY ANALYSIS第99-102页
        4.5.1 Mutual Authentication第100页
        4.5.2 Password Guessing Attack第100-101页
        4.5.3 Message Integrity第101页
        4.5.4 Offline Dictionary Attacks第101页
        4.5.5 Undetectable on-line Dictionary Attacks第101页
        4.5.6 Replay Attack during Extra group Computing第101-102页
        4.5.7 Mutual Authentication第102页
    4.6 PERFORMANCE COMPARISONS第102-106页
    4.7 RESILIENCE第106-107页
    4.8 SUMMARY第107-108页
CHAPTER 5 PRESCRIPTION SAFETY PROTOCOL FOR TELECARE- HEALTH SERVICES第108-137页
    5.1 BACKGROUND第108页
    5.2 TELECARE MEDICAL INFORMATION SYSTEM AND USER PRIVACY第108-111页
    5.3 SYSTEM MODEL FOR SAPS第111-114页
    5.4 SECURE AUTHENTICATION AND PRESCRIPTION SAFETY PROTOCOL第114-120页
    5.5 FORMAL MODELING AND ANALYSIS OF SAPS第120-123页
    5.6 SAPS ANALYSIS AND VERIFICATION第123-129页
        5.6.1 User Anonymity第125-126页
        5.6.2 User Un-Traceability第126-127页
        5.6.3 Offline Password Guessing Attacks第127页
        5.6.4 Perfect Forward Secrecy第127-128页
        5.6.5 Replay Attack第128页
        5.6.6 Forgery Attacks and Impersonation第128-129页
        5.6.7 Man in the Middle Attack第129页
    5.7 RESULTS AND ANALYSIS第129-136页
        5.7.1 Storage Overhead第130-131页
        5.7.2 Communication Overhead第131-132页
        5.7.3 Computation Complexity第132-133页
        5.7.4 Resilience第133-136页
    5.8 SUMMARY第136-137页
CHAPTER 6 CONCLUSION第137-141页
BIBLIOGRAPHY第141-151页
作者简历及在学研究成果第151-155页
学位论文数据集第155页

论文共155页,点击 下载论文
上一篇:修辞批评视角下北京申办2022年冬季奥林匹克运动会现场陈述词研究
下一篇:基于一种改进特征选择方法的股票分类研究