期刊文献+

基于哈希链的BLE密钥协商方案设计 被引量:2

Design of BLE Key Agreement Scheme Based on Hash Chain
下载PDF
导出
摘要 针对低功耗蓝牙安全简单配对协议易受到窃听攻击和中间人攻击的问题,将哈希链引入低功耗蓝牙配对过程,提出了一种基于哈希链的低功耗蓝牙密钥协商方案。该方案利用哈希链的单向性和抗碰撞性实现了设备间的双向认证及链路密钥协商,同时设计哈希链更新机制,防止哈希链节点值的重复使用所带来的安全威胁。BAN逻辑安全性分析和实验结果表明,方案具有较好的安全特性,能够有效抵御窃听、中间人等攻击,同时具有较小的存储和计算开销。 Aiming at the problem that BLE Secure Simple Pairing protocol is vulnerable to eavesdropping and man-in-the-middle attacks, a BLE key agreement scheme based on hash chain was proposed. The scheme realized mutual authentication and link key agreement applying the unidirectivity and crashworthiness of hash chain. Update mechanism of the hash chain was designed to prevent from reuse of hash chain node values. The security analysis of BAN logic and experiment results show that, the scheme can effectively resist eavesdropping and man-in-the-middle attacks. Meanwhile, it has low storage and computation overheads.
出处 《系统仿真学报》 CAS CSCD 北大核心 2016年第6期1412-1418,1444,共8页 Journal of System Simulation
关键词 低功耗蓝牙 哈希链 密钥协商 窃听攻击 中间人攻击 BLE hash chain key agreement eavesdropping attack man-in-the-middle attack
  • 相关文献

参考文献11

  • 1Bluetooth Special Interest Group.Bluetooth SIG Specification of the Bluetooth system: core package version 4.0 [EB/OL]. (2009-07-28) [2015-04-20]. http://www.bluetooth.org. 2009.
  • 2魏德龄.蓝牙4.2欲让物联网成真,低功耗成核心优势[EB/OL]. (2015-01-23) [2015-04-21]. http://www.cctime.com/index.asp. 2015.
  • 3Heiner Perrey, Osman Ugus, Dirk Westhoff. Security enhancement for bluetooth low energy with Merkle's puzzle [C]// Proceedings of Mobile Computing and Communications Review. New York: ACM, 2011: 45-46.
  • 4Iman Almomani, Mohammed A1-Saruri, Mousa Tawfiq AL-Akhras. Secure public key exchange against man-in-the-middle attack during secure simple pairing (SSP) in Bluetooth4.0 [J]. World Applied Sciences Journal (S1818-4952), 2011, 13(4): 769-780.
  • 5Keijo Haataja, Pekka Toivanen. Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures [J]. IEEE Transactions on Wireless Communications (S1536-1276), 2010, 9(1): 384-392.
  • 6Andrew Y Lindell. Attacks on the pairing protocol of Bluetooth v2.1 [M]. Las Vegas, Nevada, USA: Black Hat, 2008.
  • 7Jani Suomalainen, Jukka Valkonen, N Asokan, Security associations in personal networks: A comparative analysis [C]// 4th European Workshop, ESAS 2007, Cambridge, UK, Finland: NOKIA Research Center, 2007:1-18.
  • 8Bin Yu, Haiyan Li. Research and Design of one Key Agreement Scheme in Bluetooth [C]// Computer Science and Software Engineering, 2008 International Conference on. Wuhan: IEEE, 2008: 665-668.
  • 9Diallo, A1-Khateeb, Wajdi Fawzi, et al. A Secure Authentication Scheme for Bluetooth Connection [C]// Computer and Communication Engineering (ICCCE). Kuala Lumpur: IEEE, 2014: 60-63.
  • 10施荣华,翁丽萍,王国才.基于单向哈希链的Ad Hoc网络密钥协商协议[J].湖南大学学报(自然科学版),2011,38(3):77-81. 被引量:5

二级参考文献16

  • 1施荣华.一种基于单向函数的双重认证存取控制方案[J].电子科学学刊,1997,19(2):278-281. 被引量:23
  • 2Eschenauer L, Gtigor V D. A Key-management Scheme for Distributed Sensor Networks[C]//Proc. of the 9th ACM Conference on Computer and Communications Security. Washington D. C., USA: ACM Press, 2002:41-47.
  • 3Cha W, Wang G, Cho G. A Pair-wise Key Agreement Scheme in Ad Hoc Networks[C]//Proc. of ICCS'04, Alabama, USA: [s. n.], 2004.
  • 4Wang G, Cho G, Bang S. A Pair-wise Key Establishment Scheme without Predistributing Keys for Ad-hoc Networks[C]//Proc. of ICC'05. Seoul, Korea: [s. n.], 2005.
  • 5Lee J S, Chang C C. Secure Communications for Cluster-based Ad hoe Networks Using Node Identities[J]. Journal of Network and Computer Applications, 2007, 30(4): 1377-1396.
  • 6Koblitz N, Menezes A J, Vanstone S A. The State of Elliptic Curve Cryptography[J]. Design, Codes and Cryptography, 2000, 19(2/3): 173-193.
  • 7Schneier B. Applied Cryptography Protocols Algorithms and Source Code[M]. 2nd ed. [S. l.]: John Wiley and Sons Inc., 1996.
  • 8DAVID R,IGNAS G N.Ad Hoc networking in future wireless communications[J].Computer Communications,2003,26(1):36-40.
  • 9DIFFIE W,HELLMAN M E.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
  • 10RIVEST R,SHAMIR A,ADLEMAN L.A Method for obtaining digital signatures and public key cryptosystems[J].Communications of the ACM,1978,26(1):96-99.

共引文献6

同被引文献5

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部