检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:金志刚 吴桐 李根 JIN Zhigang;WU Tong;LI Gen(School of Electrical and Information Engineering,Tianjin University,Tianjin 300072,China)
机构地区:[1]天津大学电气自动化与信息工程学院
出 处:《信息网络安全》2019年第10期16-23,共8页Netinfo Security
基 金:国家自然科学基金[61571318];中国博士后科学基金[2016M601265]
摘 要:物联网领域中应用了大量的无线通信技术,由于成本等原因,其安全问题却往往被忽视。针对短距离无线通信技术在物联网设备中暴露出来的安全性问题,文章以目前物联网领域中广泛使用的智能锁为研究对象,分析了以低功耗蓝牙为例的短距离无线通信技术在物联网智能锁安全机制中的运用,使用协议分析与安全模型解析等方法研究了物联网智能锁现阶段存在的安全漏洞。同时举例描述了潜在的对物联网智能锁进行远程攻击的方法,基于CPN模型分析了物联网智能锁对非法重放攻击以及窃听攻击的抵抗性,并针对安全漏洞提出了相应的改进方法。通过利用CPN模型对加固后的通信模型进行分析,证明该模型可有效抵御非法重放攻击以及窃听攻击。A large number of wireless communication technologies are nowapplied in the Internet of Things field,and the security problems therein are often neglected due to cost and the like.Aiming at the security problems exposed by shortdistance wireless communication technology in IdT devices,this paper takes the smart locks which are widely used in the field of Internet of Things as the research object,and analyzes the short distance wireless communication technology with Bluetooth Low Energy as an example.The application of IoT smart lock security mechanism,using protocol analysis and security model analysis,etc.,studied the security vulnerabilities existing in the IdT smart lock.The method of remote attack on IdT smart lock is described by example.Based on CPN model,the resistance of IoT smart lock to illegal replay attacks and eavesdropping attacks is analyzed,and corresponding improvement methods are proposed for security vulnerabilities.The CPN model is used to analyze the reinforced communication model to prove that it can resist the resistance to illegal replay attacks and eavesdropping attacks.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.145.36.171