Font Size: a A A

Research On An IoT Security Protocol Model That Can Resist Known Plaintext Attacks

Posted on:2019-09-05Degree:MasterType:Thesis
Country:ChinaCandidate:C Y ZangFull Text:PDF
GTID:2438330548473581Subject:Software Engineering Technology
Abstract/Summary:PDF Full Text Request
Nowadays,the technology of the Internet of Things has developed rapidly,and people's research on the Internet of Things is gradually deepening.As time goes on,IoT technology will get more and more practical applications.With the development and research of the hardware and software related to the Internet of Things,many problems have gradually emerged.How to ensure the information security among the Internet of Things communication entities is particularly important.However,the issue of secure communication of the Internet of Things through security protocols has gradually become a research hotspot.In the thesis,based on the research status of the current Internet of Things security issues,aiming at the characteristics of IoT communication,an IoT security protocol model based on protection against known plaintext attacks is proposed,which realises the identity authentication,key distribution,data encryption and other issues in the process of information interaction.The security protocol proposed in the thesis is modeled and formalized by Casper+FDR tool to prove the security of the protocol.Through the comparison with other IoT security protocols and the calculation of the expected value of network communication overhead the performance of the protocol is analyzed;Socket emulation realizes the interactive process of the protocol and explains the availability of the protocol.The main research conducted during the period is as follows:1)Through consulting the literature,we have a detailed understanding of the security issues of the Internet of Things and the research status of the Internet of Things security protocols,and summarize the existing problems.2)By analyzing the currently accepted concept of the Internet of Things architecture,the characteristics and security features of IoT communication are obtained.Through the analysis of the original IoT security protocol,an IoT security protocol based on protection against known plaintext attacks is proposed.model.3)The IoT security protocol model is divided into two phases:key negotiation and entity communication.The session key negotiation cycle can be set according to actual needs to improve communication efficiency.4)Modeling the protocol by Casper syntax specification,compiling the security protocol pseudo code of Casper syntax modeling,generating CSP description,and then formalizing the CSP description of the security protocol through the model monitoring tool FDR.5)Formally analyze the results of the security protocol,analyze the shortcomings of the security protocol,improve the security protocol model,and re-model,introduce the concept of "large random number" to modify the protocol so that it can resist known Plain or aggressive attack.6)Combine the IoT communication environment,compare the proposed security protocol model with the previously proposed IoT security protocol,analyze the performance of the protocol,and use socket programming to complete the protocol communication simulation process and verify the availability of the protocol.7)Summarize the problems and deficiencies in the research process and make plans for the next research direction.Through the research made in the thesis,we can find that the characteristics of this "security protocol model based on key update mechanism" include:1)Introduce the concept of "large random interference number" in the process of key distribution to ensure Messages cannot be deciphered;2)Session keys can be periodically updated according to communication needs to ensure the freshness of the keys;3)"Hash functions" and "Time stamps" are introduced during message integrity verification and identity authentication,which improves communication efficiency,reduces network information load,and ensures the timeliness of identity authentication.The formal analysis and performance analysis of the protocol show that the protocol can guarantee the security requirements in the Internet of Things communication environment,and its network overhead,storage complexity,and computational complexity are relatively small.
Keywords/Search Tags:security protocol, internet of things, Casper syntax modeling, formal analysis, FDR model monitoring, Known plaintext attacks, socket programming
PDF Full Text Request
Related items