工业是一个国家的根本的经济命脉,工业控制系统(Industrial Control Systems,ICS)是工业自动化体系结构的重要组成部分。随着工业4.0时代的到来,工业网络的安全性日益重要。工业以太网EtherNet/IP协议使用原有的基于标准的以太网技术,...工业是一个国家的根本的经济命脉,工业控制系统(Industrial Control Systems,ICS)是工业自动化体系结构的重要组成部分。随着工业4.0时代的到来,工业网络的安全性日益重要。工业以太网EtherNet/IP协议使用原有的基于标准的以太网技术,已经被大量使用在工业网络控制系统中,其安全性一直备受关注,国内对工业网络协议安全性的研究很少。使用形式化分析工具Scyther在Delov-Yao模型和强安全模型下对EtherNet/IP协议核心成员通用工业协议(Control and Information Protocol,CIP)所采用的加密认证TLS协议进行形式化分析。对下一代CIP协议嵌入TLS1.3具有实践价值,该方法对其他工业网络协议进行有效的安全分析有理论指导意义。展开更多
Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers.In this system,service providers consider user authentication as a critic...Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers.In this system,service providers consider user authentication as a critical requirement.To address this crucial requirement,various types of validation and key agreement protocols have been employed.The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws.This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication and key agreement protocol.The secureness of the proposed protocol undergoes an informal analysis,whose findings show that different security features are provided,including perfect forward secrecy and a resistance to DoS attacks.Furthermore,it is simulated and formally analyzed using Scyther tool.Simulation results indicate the protocol’s robustness,both in perfect forward security and against various attacks.In addition,the proposed protocol was compared with those of other related protocols in term of time complexity and communication cost.The time complexity of the proposed protocol only involves time of performing a hash function Th,i.e.,:O(12Th).Average time required for executing the authentication is 0.006 seconds;with number of bit exchange is 704,both values are the lowest among the other protocols.The results of the comparison point to a superior performance by the proposed protocol.展开更多
Wireless body area networks(WBANs)guarantee timely data processing and secure information preservation within the range of the wireless access network,which is in urgent need of a new type of security technology.Howev...Wireless body area networks(WBANs)guarantee timely data processing and secure information preservation within the range of the wireless access network,which is in urgent need of a new type of security technology.However,with the speedy development of hardware,the existing security schemes can no longer meet the new requirements of anonymity and lightweight.New solutions that do not require complex calculations,such as certificateless cryptography,attract great attention from researchers.To resolve these difficulties,Wang et al.designed a new authentication architecture for the WBANs environment,which was claimed to be secure and efficient.However,in this paper,we will show that this scheme is prone to ephemeral key leakage attacks.Further,based on this authentication scheme,an anonymous certificateless scheme is proposed for lightweight devices.Meanwhile,user anonymity is fully protected.The proposed scheme is proved to be secure under a specific security model.In addition,we assess the security attributes our scheme meets through BAN logic and Scyther tool.The comparisons of time consumption and communication cost are given at the end of the paper,to demonstrate that our scheme performs prior to several previous schemes.展开更多
文摘工业是一个国家的根本的经济命脉,工业控制系统(Industrial Control Systems,ICS)是工业自动化体系结构的重要组成部分。随着工业4.0时代的到来,工业网络的安全性日益重要。工业以太网EtherNet/IP协议使用原有的基于标准的以太网技术,已经被大量使用在工业网络控制系统中,其安全性一直备受关注,国内对工业网络协议安全性的研究很少。使用形式化分析工具Scyther在Delov-Yao模型和强安全模型下对EtherNet/IP协议核心成员通用工业协议(Control and Information Protocol,CIP)所采用的加密认证TLS协议进行形式化分析。对下一代CIP协议嵌入TLS1.3具有实践价值,该方法对其他工业网络协议进行有效的安全分析有理论指导意义。
文摘Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers.In this system,service providers consider user authentication as a critical requirement.To address this crucial requirement,various types of validation and key agreement protocols have been employed.The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws.This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication and key agreement protocol.The secureness of the proposed protocol undergoes an informal analysis,whose findings show that different security features are provided,including perfect forward secrecy and a resistance to DoS attacks.Furthermore,it is simulated and formally analyzed using Scyther tool.Simulation results indicate the protocol’s robustness,both in perfect forward security and against various attacks.In addition,the proposed protocol was compared with those of other related protocols in term of time complexity and communication cost.The time complexity of the proposed protocol only involves time of performing a hash function Th,i.e.,:O(12Th).Average time required for executing the authentication is 0.006 seconds;with number of bit exchange is 704,both values are the lowest among the other protocols.The results of the comparison point to a superior performance by the proposed protocol.
基金This work was supported by the National Natural Science Foundation of China(Grant Nos.61872449,62172433,62072093,62125205)the Science Foundation for the Excellent Youth Scholars of Henan Province(No.222300420099).
文摘Wireless body area networks(WBANs)guarantee timely data processing and secure information preservation within the range of the wireless access network,which is in urgent need of a new type of security technology.However,with the speedy development of hardware,the existing security schemes can no longer meet the new requirements of anonymity and lightweight.New solutions that do not require complex calculations,such as certificateless cryptography,attract great attention from researchers.To resolve these difficulties,Wang et al.designed a new authentication architecture for the WBANs environment,which was claimed to be secure and efficient.However,in this paper,we will show that this scheme is prone to ephemeral key leakage attacks.Further,based on this authentication scheme,an anonymous certificateless scheme is proposed for lightweight devices.Meanwhile,user anonymity is fully protected.The proposed scheme is proved to be secure under a specific security model.In addition,we assess the security attributes our scheme meets through BAN logic and Scyther tool.The comparisons of time consumption and communication cost are given at the end of the paper,to demonstrate that our scheme performs prior to several previous schemes.