基于用戶屬性的遠程證明協(xié)議的形式化研究
[Abstract]:Nowadays, with the rapid development of information technology, the network goes deep into people's lives. Online shopping is becoming more and more popular, more and more people carry out financial transactions through online payment, and companies manage the company's internal information and data sharing through a variety of internal networks. Cloud computing provides users with a wide range of network security services. The payment account and password of people's financial transactions, the important confidential documents and data of the company, and the user data in the cloud environment all involve the processing of confidential and important data. Because of the openness and complexity of modern networks, this data is easily collected and attacked by attackers, who can intercept users' financial accounts and passwords during communication. Can maliciously attack the company's terminal or server to steal important information and data, and so on. Therefore, before carrying out all kinds of secure operations of the network, the communication entities in the network need to verify and confirm each other's identity and configuration information in order to ensure the security of their own platform. The trusted platform TPM and remote certification protocol proposed by the trusted computing organization. It can effectively prevent such attacks based on trusted computing. The remote certification protocol provides trusted data to ensure the security of the communication entity in the network, to ensure the legitimacy of the identity of the platform interacting with the communication entity and the reliability of the software running on the platform, so the remote certification protocol pays securely in the network, Network terminal access and trusted cloud service have important applications, which can prevent the leakage of important data. In the mobile phone payment, the remote proof protocol can provide the configuration information and credibility of the mobile phone user for the financial server, and can verify the terminal equipment of the accessed system for the trusted network. You can verify the identity and integrity of cloud nodes for cloud service systems. In this paper, the formal analysis of the complete remote certification protocol is carried out, and the main work is as follows: (1) the remote certification protocol is analyzed. The formal analysis of the protocol is carried out by using SPIN model detection tool according to the process of remote certification protocol and the security objectives to be satisfied, and the remote certification protocol is analyzed mainly from the point of view of user process User and remote verifier Verifier. It is found that the protocol is vulnerable to replay attack, camouflage attack and sabotage attack. The attack paths detected by SPIN include destroying PrivacyCA authentication, destroying user User authentication, destroying remote verifier Verifier authentication and destroying user metric log ML confidentiality. It is concluded that there are security vulnerabilities in the protocol. (2) the user attribute is used to improve the protocol, and the improved protocol is formally analyzed by using the method of user attribute plus salt SHUA (Secure Hash with User Attributes Algorithm) to prove the legal identity of the User platform. Use User unique properties to add to the protocol for transmission. At the same time, SVO logic analysis method and SPIN model detection tool are used to formalize the improved remote proof protocol based on user attributes. SVO logic forward analysis shows that the protocol meets the security authentication goal. SPIN reverse analysis shows that the attack path of the improved protocol has been eliminated, and the security of the protocol has been improved. (3) the protocol prototype is designed to test the energy consumption of the protocol, and the APK file is generated. PowerTutor tool is used to test the energy consumption of CPU,LED communication. The experimental results show that the overall energy consumption of the protocol is not high, and it is light to be used in mobile payment.
【學(xué)位授予單位】:太原理工大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP309
【參考文獻】
相關(guān)期刊論文 前10條
1 肖美華;朱科;馬成林;;基于SPIN的Andrew Secure RPC協(xié)議并行攻擊模型檢測[J];計算機科學(xué);2015年07期
2 馮偉;馮登國;;基于串空間的可信計算協(xié)議分析[J];計算機學(xué)報;2015年04期
3 張曉偉;王崢;陳永樂;;一種基于用戶屬性的遠程證明方案[J];太原理工大學(xué)學(xué)報;2015年02期
4 田野;彭彥彬;楊玉麗;彭新光;;無線體域網(wǎng)中基于屬性加密的數(shù)據(jù)訪問控制方案[J];計算機應(yīng)用研究;2015年07期
5 冉俊軼;吳盡昭;;基于Spin的安全協(xié)議形式化驗證技術(shù)[J];計算機應(yīng)用;2014年S2期
6 肖茵茵;蘇開樂;;電子商務(wù)支付協(xié)議認證性的SVO邏輯驗證[J];計算機工程與應(yīng)用;2014年08期
7 閆建紅;;一種基于屬性證書的動態(tài)可信證明機制[J];小型微型計算機系統(tǒng);2013年10期
8 范玉濤;蘇桂平;;一種含時間因素的安全協(xié)議形式化分析方法[J];計算機應(yīng)用與軟件;2013年01期
9 譙婷婷;王樂;王芳;葛艷;;基于Coq的軟件安全性驗證[J];計算機應(yīng)用;2012年S2期
10 尤啟房;楊晉吉;;SIP協(xié)議的SPIN模型檢測[J];計算機工程與應(yīng)用;2014年13期
相關(guān)博士學(xué)位論文 前2條
1 付東來;基于可信平臺模塊的遠程證明關(guān)鍵技術(shù)研究及其應(yīng)用[D];太原理工大學(xué);2016年
2 魯來鳳;安全協(xié)議形式化分析理論與應(yīng)用研究[D];西安電子科技大學(xué);2012年
相關(guān)碩士學(xué)位論文 前1條
1 劉俏威;SPIN模型檢測的形式化分析機理研究及應(yīng)用[D];南昌大學(xué);2008年
,本文編號:2481117
本文鏈接:http://sikaile.net/shoufeilunwen/xixikjs/2481117.html