WSN安全協(xié)議抗離線字典攻擊能力研究
[Abstract]:With the rapid development of information technology, wireless sensor network (WSN) applications have been rapidly popularized, involving military, health care, smart home, space exploration, urban transportation, airport, large-scale industrial park security monitoring and other fields. Safety is not a very important problem for most non-commercial applications, such as environmental monitoring, forest fire prevention and other applications. For applications such as wireless security networks in commercial applications or military surveillance networks deployed in enemy control areas in military applications, for data sampling and data transmission, Even the location distribution of sensor nodes can not be controlled by irrelevant or enemy personnel, so the security problem becomes more and more important. This paper mainly studies the security of wireless sensor networks from two aspects: the ability of resisting offline dictionary attacks and the confidentiality of security protocols. The research on the ability of security protocols to resist off-line dictionary attacks is mainly concerned with two problems: first, what are the conditions for security protocols to have the ability to resist offline dictionary attacks; secondly, the limitations of wireless sensor networks should be considered. How to reduce the consumption of resources when the ability to resist offline dictionary attacks remains unchanged. The confidentiality argument is conducted on the assumption that the key is secure. In this paper, a formal model of security protocol based on applied pi calculus is constructed, which is devoted to prove the ability of resisting dictionary attack and confidentiality of sensor network security protocol by means of logical formal method. The main contents of this paper are as follows: (1) the ability of security protocol to resist offline dictionary attacks is demonstrated. Dictionary attack is a key attack, which is more common in the Internet and traditional wireless networks, but there is less research on it in wireless sensor networks. Since sensor networks are more vulnerable to attack due to their limitations in energy consumption and computing power, it is necessary to study dictionary attacks in wireless sensor networks. This paper starts with the security attribute of the security protocol encryption scheme, takes the SNEP protocol as an analysis case, and makes use of the static equivalence and observational equivalence theory in applied pi calculus. This paper analyzes and demonstrates the influence of different key strength and encryption scheme of different attributes on the ability of security protocol to resist off-line dictionary attack, and then obtains the condition that the security protocol of sensor network has the ability to resist off-line dictionary attack. Finally, the method of determining the security attribute of encryption scheme is given. (2) confidentiality proof. Confidentiality is the core of many security requirements in wireless sensor networks. The focus of network security is usually to solve the problem of data confidentiality. The confidentiality of security protocols directly determines the security of the transmission of data messages in the network. Based on the applied pi calculus, this paper constructs the SNEP protocol confidentiality demonstration model, divides the protocol into two parts: the protocol process and the user process, and converts the confidentiality of the protocol into whether the protocol execution process is indistinguishable. Furthermore, the confidentiality of the protocol is proved by equivalent theory.
【學(xué)位授予單位】:福州大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP212.9;TN915.08
【相似文獻(xiàn)】
相關(guān)期刊論文 前7條
1 王春曉;張鵬;;一種新型抵御字典攻擊的方案[J];電腦知識與技術(shù);2010年01期
2 於時才;胡佳文;靳艷峰;;一種新型抵御字典攻擊的認(rèn)證方案[J];計(jì)算機(jī)工程與設(shè)計(jì);2007年08期
3 馬自堂;張魯國;;基于口令的群密鑰分發(fā)協(xié)議的分析與改進(jìn)[J];微計(jì)算機(jī)信息;2006年27期
4 孫全富;山拜·達(dá)拉拜;李慶華;;WPA/WPA2協(xié)議安全性分析[J];信息安全與通信保密;2013年04期
5 李慧慧;;口令安全淺析[J];太原大學(xué)教育學(xué)院學(xué)報(bào);2009年01期
6 葉長國;;基于口令的抵抗字典攻擊的密鑰交換協(xié)議[J];泰山學(xué)院學(xué)報(bào);2012年06期
7 ;[J];;年期
相關(guān)重要報(bào)紙文章 前2條
1 重慶大學(xué)計(jì)算機(jī)學(xué)院 路遙;破解字典攻擊 揪出內(nèi)部黑客[N];中國計(jì)算機(jī)報(bào);2008年
2 ;毒來毒網(wǎng)新趨勢[N];計(jì)算機(jī)世界;2003年
相關(guān)碩士學(xué)位論文 前2條
1 項(xiàng)俊龍;WSN安全協(xié)議抗離線字典攻擊能力研究[D];福州大學(xué);2014年
2 鮑R,
本文編號:2282845
本文鏈接:http://www.lk138.cn/kejilunwen/wltx/2282845.html