期刊文献+

传感器网络安全协议的分析和改进 被引量:8

Analysis and improvement of sensor networks security protocol
下载PDF
导出
摘要 分析A.Perrig提出的传感器网络安全协议套件的安全性,发现其中的节点密钥协商协议存在攻击,即攻击者可以冒充合法节点发送密钥协商请求。针对以上攻击,给出了一个改进协议。为了分析改进协议的安全性,对原始串空间理论进行了扩展,并使用扩展后的理论从保密性和认证性两个方面分析了改进协议的安全性。分析结果显示,改进后的协议是安全的。同时,对串空间理论的扩展,为其能够分析较复杂的安全协议打下了基础。 A suit of security protocols for sensor networks was presented by A. Perrig. The security of the protocols was analyzed, and then one attack had been found in the two-party key agreement protocol that a false request message from an intruder. In that case, the intruder impersonates the node and creates false requests. An improved protocol to this attack was proposed. The security of improved protocol was analyzed by the extended strand spaces, where two main security properties, authenticity and confidentiality, were checked. And the analysis proves the correctness of the protocol. The extended strand spaces also gives a practical base for further application of strand spaces in analyzing complicated protocols.
出处 《通信学报》 EI CSCD 北大核心 2011年第5期139-145,共7页 Journal on Communications
基金 四川省教育厅青年基金资助项目(08zb025)~~
关键词 无线传感器网络 安全协议 形式化分析 串空间 wireless sensor networks security protocols formal analysis strand spaces
  • 相关文献

参考文献11

  • 1TOBARRA L,CAZORLA D,CUARTERO F.Model checking wireless sensor network security protocols:TinySec + LEAP[A].Proceedings of the First IFIP International Conference on Wireless Sensor and Actor Networks (WSAN'07)[C].Albacete,Spain,2007.95-106.
  • 2TOBARRA L,CAZORLA D,CUARTERO F.Formal analysis of sensor network eneryption protocol (SNEP)[A].IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2007)[C].Piscataway,NJ,USA,2007.767-772.
  • 3PERRIG A,ROBERT S,VICTOR W.SPINS:security protocols for sensor networks[J].Wireless Networks Journal,2002,8(5):521-534.
  • 4PERRIG A,ROBERT S,VICTOR W.SPINS:security protocols for sensor networks[A].Proceedings of the Seventh Annual International Conference on Mobile Computing and Networks (ACM Mobicom)[C].Rome,Italy,2001.
  • 5PERRIG A,WAGNER D,STANKOVIC J.Security in wireless sensor networks[J].Communications of the ACM,2004,47(6):53-57.
  • 6THAYER F J,HERZOG J C,GUTMAN J D.Strand spaces:why is a security protocol correct[A].Proceedings of the 1998 IEEE Symposium on Security and Privacy[C].Los Alamitos:IEEE Computer Society,1998.160-171.
  • 7THAYER F J,HERZOG J C,GUTTMAN J D.Strand spaces:proving security pwtocols correct[J].Journal of Computer Security,1999,7(2,3):191-230.
  • 8THAYER F J,HERZOG J C,GUTTMAN J D.Strand spaces:honest ideals on strand spaces[A].Proceedings of the 1998 IEEE Computer Security Foundations Workshop[C].Los Alamitos:IEEE Computer Society,1998.66-77.
  • 9GUTTMAN J D,THAYER F J.Authentication tests[A].Proceedings of the 2000 IEEE Symposium on Security and Privacy[C].IEEE Computer Society Press,2000.
  • 10刘家芬,周明天.突破认证测试方法的局限性[J].软件学报,2009,20(10):2799-2809. 被引量:7

二级参考文献3

共引文献6

同被引文献65

  • 1李平,林亚平,曾玮妮.传感器网络安全研究(英文)[J].软件学报,2006,17(12):2577-2588. 被引量:30
  • 2Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks [ C ]//Proceeding of the 2003 IEEE Symposium on Security and Privacy. Berkeley, CA, USA, 2003: 197-213.
  • 3Perrig A, Szewczyk R, Wen V, et al. SPINS: security protocols for sensor networks I J ]- Wireless Networks Journal, 2002, 8(5) : 521 -534.
  • 4Zhu S, Setia S, Jajodia S. LEAP + : efficient security mechanisms for large-scale distributed sensor networks [ J]. ACM Transactions on Sensor Networks, 2006, 2 (4) : 500-528.
  • 5Deng J, Han R, Mishra S. INSENS : intrusion-tolerant routing in wireless sensor networks [ J ]. Computer Com- munications, 2006, 29(2): 216-230.
  • 6Lazos L, Poovendran R. SeRLoc: secure range-inde- pendent localization for wireless sensor networks [ C ]// Proceedings of the 4th International Symposium on In- formation Processing in Sensor Networks. Los Angeles,CA, USA, 2005:21 -30.
  • 7Chan H, Perdg A, Przydatek B. SIA: secure informa- tion aggregation in sensor networks [ J ]. Journal of Computer Security, 2007, 15( 1 ) : 69 - 102.
  • 8Hannotin X, Maggi P, Sisto R. Formal specification and verification of mobile agent data integrity proper- ties: a case studyl C]//Proceedings of the 5th Interna- tional Conference on Mobile Agents. Atlanta, GA, USA, 2001:42-53.
  • 9Dojen R, Lasc I, Coffey T. Establishing and fixing a freshness flaw in a key-distribution and authentication protocol [ C ]//IEEE the 4th International Conference on Intelligent Computer Communication and Process- ing. 2008. Cluj-Napoca, Romania, 2008:185 - 192.
  • 10Novotny M. Formal analysis of security protocols for wireless sensor network [ J ]. Tatra Moutains Mathe- matical Publications, 2010, 47( 1 ) : 81 -97.

引证文献8

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部