基于連接認證的低功耗藍牙泛洪攻擊防御方案
發(fā)布時間:2018-10-31 15:18
【摘要】:針對低功耗藍牙易受泛洪攻擊的問題,提出了一種連接認證模型,基于該模型設計了低功耗藍牙泛洪攻擊防御方案。方案結(jié)合HMAC(hash-based message authentication code)運算速度快與藍牙通信同步性強的特點,設計檢測模塊判斷通信狀態(tài),利用挑戰(zhàn)應答的方式設計連接請求認證協(xié)議,在藍牙協(xié)議運行前進行主從設備雙向認證,過濾掉攻擊報文,保證低功耗藍牙連接建立的安全。安全性分析和實驗結(jié)果表明,方案能夠有效防御泛洪攻擊,同時具有較小的存儲和計算開銷,適合應用于低功耗藍牙中。
[Abstract]:Aiming at the problem that low power Bluetooth is vulnerable to flooding attack, a connection authentication model is proposed. Based on this model, a low power Bluetooth flooding attack defense scheme is designed. Combined with the characteristics of HMAC (high speed of hash-based message authentication code) operation and strong synchronization of Bluetooth communication), a detection module is designed to judge the communication status, and a connection request authentication protocol is designed by means of challenge response. Two-way authentication of master-slave devices is carried out before the Bluetooth protocol is run, and attack packets are filtered out to ensure the security of low-power Bluetooth connection establishment. The security analysis and experimental results show that the proposed scheme can effectively protect against flooding attack and has less storage and computing overhead, so it is suitable for low power Bluetooth.
【作者單位】: 信息工程大學密碼工程學院;
【分類號】:TN925
[Abstract]:Aiming at the problem that low power Bluetooth is vulnerable to flooding attack, a connection authentication model is proposed. Based on this model, a low power Bluetooth flooding attack defense scheme is designed. Combined with the characteristics of HMAC (high speed of hash-based message authentication code) operation and strong synchronization of Bluetooth communication), a detection module is designed to judge the communication status, and a connection request authentication protocol is designed by means of challenge response. Two-way authentication of master-slave devices is carried out before the Bluetooth protocol is run, and attack packets are filtered out to ensure the security of low-power Bluetooth connection establishment. The security analysis and experimental results show that the proposed scheme can effectively protect against flooding attack and has less storage and computing overhead, so it is suitable for low power Bluetooth.
【作者單位】: 信息工程大學密碼工程學院;
【分類號】:TN925
【相似文獻】
相關(guān)期刊論文 前10條
1 曾向榮;楊光;羅鵬程;;數(shù)據(jù)鏈中面向可靠傳輸?shù)姆汉樗惴皯梅治鯷J];小型微型計算機系統(tǒng);2010年03期
2 高小偉;王萍;王春泉;;一種改進的多點泛洪自動搜索算法的設計與實現(xiàn)[J];系統(tǒng)仿真學報;2006年S1期
3 潘達儒;羅泓;;基于泛洪協(xié)議的無線Mesh網(wǎng)絡路由研究[J];計算機與現(xiàn)代化;2007年10期
4 莫毓昌;崔剛;;基于泛洪的可靠廣播算法分析[J];哈爾濱工業(yè)大學學報;2006年03期
5 于秦;王偉東;秦志光;毛玉明;;無線傳感器網(wǎng)絡最優(yōu)搜索泛洪協(xié)議研究[J];計算機科學;2010年02期
6 孫踐知;,
本文編號:2302671
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2302671.html
最近更新
教材專著