期刊文献+

一种从设备零秘密存储的蓝牙密钥协商方案

Bluetooth Key Agreement Scheme with Zero Secret Storage in Slave Device
下载PDF
导出
摘要 针对现有蓝牙配对协议难以抵抗中间人攻击、复制攻击的问题,提出了一种从设备零秘密存储的蓝牙密钥协商方案。该方案利用物理不可克隆函数(Physical Unclonable Functions,PUF),在从设备不存储任何秘密参数的情况下,通过"三次握手"实现主设备与从设备的双向认证及链路密钥协商。理论分析和实验结果表明,该方案不仅具有较高的安全性,而且通信、计算和存储开销均较小。 To solve the problem that the existing bluetooth pairing protocol is difficult to resist the man-in-the-middle attacks and replication attacks,a bluetooth key agreement scheme with zero secret storage in slave device was proposed.By using the Physical Unclonable Functions(PUF),this scheme realized the mutual authentication and link key agreement between the master device and the slave device through “three-time handshake” in the case that the slave device need not store any secret parameters.Theoretical analysis and experimental results show that the proposed scheme not only has high security,but also needs less communication,calculation and storage cost.
作者 李森森 黄一才 郁滨 LI Sen-sen;HUANG Yi-cai;YU Bin(Information Engineering University,Zhengzhou 450001,China)
机构地区 信息工程大学
出处 《计算机科学》 CSCD 北大核心 2019年第4期151-157,共7页 Computer Science
基金 国防信息保障技术重点实验室开放基金(KJ-15-104)资助
关键词 蓝牙 PUF 密钥协商 中间人攻击 复制攻击 Bluetooth PUF Key agreement Man-in-the-middle attack Replication attack
  • 相关文献

参考文献3

二级参考文献36

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2GASSEND B, CLARKE D, VANDIJK M, et al. Delay-based circuit authentication and applications[ C]// ACM Symposium on Applied Computing. New York: ACM, 2003:294 - 301.
  • 3PAPPU R S. Physical one-way functions[ D]. Boston: Massachusetts Institute of Technology, 2001.
  • 4LIM D, Extracting secret keys from integrated circuits[ D]. Boston: Massachusetts Institute of Technology, 2004.
  • 5LEE JW, LIM D, GASSEND B, et al. A technique to build a secret key in integrated circuits for identification and authentication application[ C] // Proceedings of the Symposium on VLSI Circuits. Washington, DC: IEEE Computer Society, 2004:176 - 159.
  • 6KUMAR S, GUAJARDO J, MAES R, et al. The butterfly PUF protecting IP on every FPGA[ C]//IEEE International Workshop on Hardware-oriented Security and Trust. Washington, DC: IEEE Computer Society, 2008 : 67 - 70.
  • 7OZTURK E, HAMMOURI G, SUNAR B. Towards robust low cost authentication for pervasive devices [ C ]// Proceedings of the Sixth IEEE International Conference on Pervasive Computing and Communication. Washington, DC: IEEE Computer Society, 2008:170 - 178.
  • 8SADEGHI A R, SCHULZ S, WACHSMANN C. Lightweight remote attestation using physical function[ C]// Conference on Wireless Network Security. New York: ACM, 2011 : 109 - 114.
  • 9TUYLS P. BATINA L. RFID-tags for anti-conterferting[ C]//Topics in Cryptology,2006, LNCS 3860. Bedim Springer, 2006:13 - 17.
  • 10BATINA L. GUAJARDO J. KERINS T, et al. Public-key cryptography for RFID-tags[ C]//Pervasive Computing and Communications Workshops. New York: ACM, 2007 : 217 - 222.

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部