西安电子科技大学学报 ›› 2021, Vol. 48 ›› Issue (3): 188-196.doi: 10.19665/j.issn1001-2400.2021.03.023

• 网络空间安全 • 上一篇    下一篇

T-NTRU物联网动态接入认证技术

李兴华1(),蔡觉平2(),李晓龙1(),王峰1(),闫振华1()   

  1. 1.国网宁夏电力有限公司 电力科学研究院,宁夏回族自治区 银川 750001
    2.西安电子科技大学 微电子学院,陕西 西安 710071
  • 收稿日期:2020-10-13 出版日期:2021-06-20 发布日期:2021-07-05
  • 作者简介:李兴华(1985—),男,高级工程师,E-mail:cc1107@163.com|蔡觉平(1976—),男,教授,E-mail:jpcai@mail.xidian.edu.cn|李晓龙(1989—),男,高级工程师,E-mail:447013965@qq.com|王峰(1989—),男,高级工程师,E-mail:371673703@qq.com|闫振华(1982—),男,高级工程师,E-mail:154460982@qq.com
  • 基金资助:
    宁夏自然科学基金(2020AAC03486);国网宁夏电力有限公司科技项目(5229DK19004T);战略性国际科技创新合作重点专项(2016YFE0207000)

T-NTRU IoT dynamic access authentication technology

LI Xinghua1(),CAI Jueping2(),LI Xiaolong1(),WANG Feng1(),YAN Zhenhua1()   

  1. 1. Scientific Research Institute of State Grid Ningxia Electric Power Company,Yinchuan 750001,China
    2. School of Microelectronics,Xidian University,Xi’an 710071,China
  • Received:2020-10-13 Online:2021-06-20 Published:2021-07-05

摘要:

物联网终端安全接入认证是保证电力物联网大规模建设的关键性技术。传统认证方案通常采用的椭圆曲线密码算法,计算量大,不能抵抗量子攻击。数论研究单元算法可以抵抗量子攻击,与椭圆曲线密码采用点乘算法相比,计算速度快。因此提出了一种时间变换数论研究单元算法物联网动态安全接入认证算法,使用动态变化时间序列通过哈希函数产生动态密钥,解决了固定哈希函数产生固定密钥的内部攻击安全问题。分别在计算机和单片机上进行了实验。实验结果表明,与传统椭圆曲线密码计算相比较,时间变换数论研究单元算法减少了约97%计算量,与典型的数论研究单元算法计算量相当,适合资源受限的电力物联网应用需求。

关键词: 物联网, 数论研究单元算法, 安全认证

Abstract:

The secure access authentication of the Internet of the things terminal is the key technology to ensure the large-scale construction of the power Internet of things.The elliptic curve cryptography (ECC) algorithm is usually used in the transmission authentication scheme,and it requires a large amount of calculation.Furthermore it is proved that its security against quantum attacks is poor.The number theory research unit (NTRU) algorithm can resist quantum attacks,and its computational speed is faster than that of the ECC.This paper proposes a dynamic T-NTRU secure access authentication algorithm based on time information in the Internet of things.It uses the dynamic changing time series as the secret key of the hash function to solve the internal attack security problem caused by the fixed hash function.Experiments are carried out on the computer and single chip microcomputer,respectively.Experimental results show that compared with the traditional ECC calculation,the T-NTRU algorithm proposed in this paper reduces about 97% of the calculational amount,which is equivalent to the typical NTRU algorithm,and is suitable for the need of the resource constrained power IOT network application.

Key words: power iot network, number theory reseach unit, secure access protocol

中图分类号: 

  • TP391
Baidu
map