基于連接認(rèn)證的低功耗藍(lán)牙泛洪攻擊防御方案
發(fā)布時(shí)間:2018-10-31 15:18
【摘要】:針對(duì)低功耗藍(lán)牙易受泛洪攻擊的問(wèn)題,提出了一種連接認(rèn)證模型,基于該模型設(shè)計(jì)了低功耗藍(lán)牙泛洪攻擊防御方案。方案結(jié)合HMAC(hash-based message authentication code)運(yùn)算速度快與藍(lán)牙通信同步性強(qiáng)的特點(diǎn),設(shè)計(jì)檢測(cè)模塊判斷通信狀態(tài),利用挑戰(zhàn)應(yīng)答的方式設(shè)計(jì)連接請(qǐng)求認(rèn)證協(xié)議,在藍(lán)牙協(xié)議運(yùn)行前進(jìn)行主從設(shè)備雙向認(rèn)證,過(guò)濾掉攻擊報(bào)文,保證低功耗藍(lán)牙連接建立的安全。安全性分析和實(shí)驗(yàn)結(jié)果表明,方案能夠有效防御泛洪攻擊,同時(shí)具有較小的存儲(chǔ)和計(jì)算開(kāi)銷(xiāo),適合應(yīng)用于低功耗藍(lán)牙中。
[Abstract]:Aiming at the problem that low power Bluetooth is vulnerable to flooding attack, a connection authentication model is proposed. Based on this model, a low power Bluetooth flooding attack defense scheme is designed. Combined with the characteristics of HMAC (high speed of hash-based message authentication code) operation and strong synchronization of Bluetooth communication), a detection module is designed to judge the communication status, and a connection request authentication protocol is designed by means of challenge response. Two-way authentication of master-slave devices is carried out before the Bluetooth protocol is run, and attack packets are filtered out to ensure the security of low-power Bluetooth connection establishment. The security analysis and experimental results show that the proposed scheme can effectively protect against flooding attack and has less storage and computing overhead, so it is suitable for low power Bluetooth.
【作者單位】: 信息工程大學(xué)密碼工程學(xué)院;
【分類(lèi)號(hào)】:TN925
[Abstract]:Aiming at the problem that low power Bluetooth is vulnerable to flooding attack, a connection authentication model is proposed. Based on this model, a low power Bluetooth flooding attack defense scheme is designed. Combined with the characteristics of HMAC (high speed of hash-based message authentication code) operation and strong synchronization of Bluetooth communication), a detection module is designed to judge the communication status, and a connection request authentication protocol is designed by means of challenge response. Two-way authentication of master-slave devices is carried out before the Bluetooth protocol is run, and attack packets are filtered out to ensure the security of low-power Bluetooth connection establishment. The security analysis and experimental results show that the proposed scheme can effectively protect against flooding attack and has less storage and computing overhead, so it is suitable for low power Bluetooth.
【作者單位】: 信息工程大學(xué)密碼工程學(xué)院;
【分類(lèi)號(hào)】:TN925
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 曾向榮;楊光;羅鵬程;;數(shù)據(jù)鏈中面向可靠傳輸?shù)姆汉樗惴皯?yīng)用分析[J];小型微型計(jì)算機(jī)系統(tǒng);2010年03期
2 高小偉;王萍;王春泉;;一種改進(jìn)的多點(diǎn)泛洪自動(dòng)搜索算法的設(shè)計(jì)與實(shí)現(xiàn)[J];系統(tǒng)仿真學(xué)報(bào);2006年S1期
3 潘達(dá)儒;羅泓;;基于泛洪協(xié)議的無(wú)線(xiàn)Mesh網(wǎng)絡(luò)路由研究[J];計(jì)算機(jī)與現(xiàn)代化;2007年10期
4 莫毓昌;崔剛;;基于泛洪的可靠廣播算法分析[J];哈爾濱工業(yè)大學(xué)學(xué)報(bào);2006年03期
5 于秦;王偉東;秦志光;毛玉明;;無(wú)線(xiàn)傳感器網(wǎng)絡(luò)最優(yōu)搜索泛洪協(xié)議研究[J];計(jì)算機(jī)科學(xué);2010年02期
6 孫踐知;,
本文編號(hào):2302671
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2302671.html
最近更新
教材專(zhuān)著