Font Size: a A A

The Research On Self-secure Communication Protocols Based On Dynamic Secrets

Posted on:2019-06-24Degree:MasterType:Thesis
Country:ChinaCandidate:H Y SunFull Text:PDF
GTID:2428330545950672Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer networks and the rise of the Internet of Things(IoT),various applications of network have penetrated into all aspects of human life.Different kinds of information,credentials,and even confidential data related to users are transmitted in a large amount in the network.Secure network communication needs to be able to deal with various security threats,guarantees the security requirements of authenticity,confidentiality and integrity,and provides basic services for network authentication and secure data transmission.Once the key used by communication is stolen,the existing communication protocols need to acquire a new key and replace it in order to recover the secure communication functions.However,the detection and timely replacement of a theft key is practically impossible,especially for large networks or when network nodes are deployed in inaccessible environments.In this paper,self-secure communication protocols based on dynamic secrets are designed to deal with the key theft attack that existing protocols cannot resist.The protocols can provide secure and reliable network authentication and data transmission services.They can effectively defend against all kinds of network attacks,including key theft attack.Even if the key is stolen,it can automatically update and restore security,that is,self-security.The core mechanism of the dynamic secrets theory is to continuously update the key on unreliable communication link based on the communication information of both communication parties and randomness in the link.Therefore,the encryption key and the credentials generated by the key are all dynamic.The validity period of each key exists only in the current activity and the value of next key is difficult to be predicted.The key update does not require the participation of any third parties and additional communication and will continue to introduce information with true randomness along with the normal communication.In addition,we use Intel SGX technology to enhance key protection at local terminals based on trusted computing.We implement the self-secure authentication communication protocol in authentication scenario and combine Intel SGX technology to construct a self-secure network authentication scheme that can defend against various attacks from local terminals and network links and ensure the authenticity of the communication.Then we design and implement self-secure communication Stop-and-Wait protocols and Window protocols to meet different transmission efficiency requirements for common network communication.Experiments and security analysis prove our protocols are reliable,efficient and self-secure,providing the confidentiality and integrity of communication.The self-secure communication protocols provide an innovative communication solution,as communication continues,security is gradually enhanced,and the interference in the communication process is converted into random information which is introduced into the key.Security and efficiency make our protocols can be widely used in traditional networks and IoT with limited resources and frequent communication interference,such as wireless sensor networks.
Keywords/Search Tags:Secure Communication, Network Authentication, Dynamic Secrets, Intel SGX, Key theft
PDF Full Text Request
Related items