ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2018, Vol. 55 ›› Issue (7): 1421-1431.doi: 10.7544/issn1000-1239.2018.20180065

所属专题: 2018物联网安全专题

• 信息安全 • 上一篇    下一篇



  1. (西安电子科技大学网络与信息安全学院 西安 710071) (
  • 出版日期: 2018-07-01
  • 基金资助: 

Position Based Digital Signature Scheme in IoTs

Que Mengfei, Zhang Junwei, Yang Chao, Yang Li, Ma Jianfeng, Cui Wenxuan   

  1. (School of Cyber Engineering, Xidian University, Xi’an 710071)
  • Online: 2018-07-01

摘要: 物联网可用于收集大量与位置和时间相关的信息,如智能消防、智能交通、环境监测信息等.然而,如何保障这些时空敏感数据的安全成为了一个挑战.一方面,需要提供数据的完整性属性; 另一方面,需要确保数据源的位置和时间信息不可伪造.因此,提出了基于位置的数字签名,将其作为解决物联网中时空敏感数据安全问题的方案.首先,分别提出了不考虑时间因素的静态基于位置数字签名和考虑时间因素的动态基于位置数字签名;然后,在BRM模型下设计了3维空间中满足动态安全需求的基于位置数字签名;通过安全性分析,得出结论:该协议可以抵御敌手的共谋攻击,同时满足可证明安全.

关键词: 物联网, 基于位置密码学, 基于位置数字签名, 有界检索模型, 可证明安全

Abstract: Nowadays, lots of location and time critical data has been collected by Internet of things (IoTs), such as intelligent fire control, intelligent transportation, environmental monitoring and so on. It is well known that the location and time information of these data will play an important role on some applications in IoTs. For example, the time and location information is generated in the fire alarm system, vehicle system and UAV data acquisition system. However, how to guarantee the security of these spatio-temporal data has become a challenge. One hand, the property of the data integrity should be provided; the other hand, the location and time information of the data origin should be unforgeable. This study investigates position based signatures as one of the solutions to the security of the spatio-temporal data in IoTs. Firstly, the static position based digital signature without considering time and the dynamic position based digital signature with time constraint is proposed respectively. Then, a position based digital signature protocol based on the bounded retrieval model in 3-dimension is proposed which satisfies the security requirements of dynamic conditions. Furthermore, by analyzing the security of our protocol, we conclude that the proposed protocol can resist collusion attack of the adversaries and satisfy the provable security.

Key words: IoTs, position based cryptography, position based digital signature, bounded retrieval model (BRM), provable security