Font Size: a A A

Module Design And CSP Analysis Of Security Protocol Of Ubiquitous Computing

Posted on:2009-01-03Degree:DoctorType:Dissertation
Country:ChinaCandidate:F YangFull Text:PDF
GTID:1118360275954976Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
As the third generation computing technology following large mainframe computing and desktop computing,ubiquitous computing merging the physical world into computing world,makes the connection between human and computing more,tighter than ever.With the appeare of kinds of ubiquitous computing project,People concern more about the application of new technology while ignore the security matters more important.The appearance of more vulnerability and more severity attack makes the ubiquitous computing security research have significance values.Design and analysis of security protocols is the key technology to solve the security problem of ubiquitous computing.Several security protocols have been proposed to solve the security problem of desk computing,but they are inapplicability for ubiquitous computing.Here are several reasons:a) Specialty of ubiquitous computing.There are many different security factors between ubiquitous computing and desk computing.Such as sensor,embed system-based hardware,dynamic network flame,and node exposing scurviness circumstance,etc.b) Limitation of design security protocol.The request of security objective of ubiquitous computing is more complex than ever.There are no design method can suffice the request.c) Limitation of analysis of security protocol.There are no analysis method can suffice the request of ubiquitous computing security protocol.Centered with the analysis and design of network security protocols, some researches are carried out:a) Design of security characteristic of ubiquitous computing;b) Study of design method of security protocols;c) Study of analysis method of security protocols; d) Evaluation of security protocols。The thesis contains the following innovative ideas:First,point out the security characteristic of ubiquitous computing by comparing and analysis of previously project and computing.Second,a method of module design based on strand space theory is proposed.The accurate of the method has been proven and the rules that candidate protocols have to be accord have been proposed.With this method, a ubiquitous computing authenticated key management protocol has been designed.Third,an improvement scheme with analysis method based on model detect is proposed.The scheme remedies the weakness of model detecting method such as node limit,space explosion.Furthermore,the scheme has been proven that analysis method satisfy with completeness.So with the CSP method key management protocol has been proved security and completeness.Deal with the security characteristic of ubiquitous computing,a broadcast security protocol and key refresh protocol are proposed. Evaluation of the protocol reveals good performance of them.
Keywords/Search Tags:Ubiquitous computing, method of module design, CSP analysis of security protocols, strand space theory, completeness proved
PDF Full Text Request
Related items