一种抵御中间人攻击的可信网络连接协议  被引量:6

A Trusted Network Connect Protocol for Resisting Man-in-the-Middle Attack

在线阅读下载全文

作  者:赵波 向程[1,2,3] 张焕国 ZHAO Bo;XIANG Cheng;ZHANG Huan-Guo(School of Cyber Science and Engineering, Wuhan University, Wuhan 430072;Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, Wuhan 430072;96833 Troops, Huaihua, Hunan 418000)

机构地区:[1]武汉大学国家网络安全学院 [2]空天信息安全与可信计算教育部重点实验室 [3]96833部队

出  处:《计算机学报》2019年第5期1137-1148,共12页Chinese Journal of Computers

基  金:国家"九七三"重点基础研究发展规划项目(2014CB340600);国家"八六三"高技术研究发展计划项目(2015AA016002);国家自然科学基金重点项目(61332019);武汉市应用基础前沿项目(2018010401011295)资助~~

摘  要:可信计算组织TCG提出的可信网络连接TNC可以很好地解决网络接入过程中的安全威胁.但由于TNC网络访问层和完整性评估层之间没有绑定关系,平台完整性信息可以被冒用,容易遭受中间人攻击,导致不合法的终端接入网络.为解决这一问题,我们设计了一种抵御中间人攻击的可信网络连接协议S-TNC(SafeTNC),在完整性评估层基于TPM协商一个秘密密钥,将其与平台完整性报告绑定,再由这个秘密密钥直接导出会话密钥,用于通信对端之间数据通信的保护,实现认证对端和通信对端的密码学绑定,抵御中间人攻击.经BAN逻辑形式化分析和实验测试,该协议本身没有发现安全缺陷,可以抵御中间人攻击.与现有方案相比,该协议不额外增加实体和证书,密钥受TPM保护,具有简单安全的特点.Trusted Computing Organization (TCG) proposes the Trusted Network Connection (TNC) to solve the threats and problems in network access. However, due to the TNC architecture design features, it is vulnerable to man-in-the-middle attack, which can lead to illegal access, service interruption, sensitive information leakage and other security issues. By in-depth study of the attack process, the crux of the problem is found. Because there is no binding relationship between the network access layer and the integrity evaluation layer, valid authentication between the Access Requestor (AR) and the Policy Decision Point (PDP) is lacking. Attacker can use a legal terminal’s platform integrity information by passing the TNC request and reply message in the middle. It impersonates a legal terminal to get access to network illegally. To solve this problem, this paper designs an improved protocol S-TNC (Safe TNC). According to S-TNC, a secret is negotiated in integrity evaluation layer between AR and PDP. Firstly, AR generates a pair of Bind Key (BK) based on Trusted Platform Module (TPM) and signs it with Attestation Identity Key (AIK) to prove that the BK belongs to AR’s platform. Secendly, PDP generates a secret and send it to AR protected by BK. Thirdly, AR uses the secret as the externalData parameter of TPM_Quote command to generate the platform integrity report, so it is bound with the platform integrity report. Finally, after verifying the integrity of AR’s platform, PDP and AR both believe that the secret is only known to them, and they derive a session key using the same key generation algorithm based on the secret to protect the subsequent communication. So a cryptography bound between the authentication peers and the communication peers is achieved to resist man-in-the-middle attack. For S-TNC, the secret is the key thing to resist man-in-the-middle. The secret is generated based on AIK authentication and protected by TPM. It has a natural binding relationship with the platform. Any middleman can not acquire

关 键 词:可信计算 可信网络 可信网络连接 中间人攻击 平台信息冒用 秘密密钥生成 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象