信息安全研究 ›› 2018, Vol. 4 ›› Issue (9): 819-824.

• 学术论文 • 上一篇    下一篇

面向物联网信息安全保护的轻量化密钥体系设计

刘熙胖,廖正赟,卫志刚   

  1. 郑州信大捷安信息技术股份有限公司
  • 收稿日期:2018-09-17 出版日期:2018-09-15 发布日期:2018-09-17
  • 通讯作者: 刘熙胖
  • 作者简介:刘熙胖 硕士,工程师,主要研究方向为信息安全、物联网. 廖正赟 硕士,工程师,主要研究方向为信息安全、网络安全 卫志刚 硕士,工程师,主要研究方向为信息安全、通信软件.

Lightweight Key Management Scheme for Internet of Things

  • Received:2018-09-17 Online:2018-09-15 Published:2018-09-17

摘要: 物联网的高速发展影响并改变着人们的生活、工作方式,同时现实的需求也促进着物联网技术的快速发展.针对物联网高容量、网络/终端设备复杂、低功耗、终端设备计算能力有限等特点,轻量化、微型化成为满足物联网安全体系、密钥管理方案等设计的基本要求.对于面向物联网的轻量化密钥管理方案设计,传统基于数字证书和PKI体系实现身份认证和密钥协商的方案,在物联网应用场景下并不适合,复杂的交互过程及数字证书交换认证模式,会消耗大量的计算和网络资源.基于此,基于国有密码算法,以对称算法密钥实现终端设备端认证、会话密钥协商、数据加/解密服务,非对称算法密钥实现密钥交换及导入保护,在保证系统安全的情况下,面向物联网的轻量化应用场景,实现体系化的密钥管理方案,满足物联网环境下密钥管理性能指标及功能需求.

关键词: 物联网, 轻量级密钥管理系统, 密钥体系, 对称密钥, 密钥分散

Abstract: Abstract The rapid development of IoT affects and changes people's lives and way of working. At the same time, the realistic demand also promotes the rapid development of the technology of IoT. For the characteristics of high capacity, complex network/terminal equipment, low power consumption and limited computing power of terminal devices of IoT, lightweight and miniaturization have become the basic requirements for designing the IoT security system and key management scheme.For the design of the lightweight key management scheme oriented to IoT, the traditional schemes for implementing identity authentication and key agreement based on digital certificates and PKI systems are not suitable under the application scenarios of IoT. Due to the complex interactive process and the authentication mode of digital certificate exchange, a lot of computing and network resources will be consumed. Based on this, under the circumstance of ensuring the security of the system, orienting to lightweight application scenario of IoT and based on the national cryptographic algorithm, a full lifecycle management scheme is implemented. Using symmetric algorithm keys to achieve terminal device authentication, session key agreement, data encryption/decryption services, and using asymmetric algorithm keys for key exchange and import protection. And the performance and function requirements of key management in IoT environment are well-suited to meet.

Key words: Internet of things, lite key manager system, key system, symmetric key, key dispersion