Font Size: a A A

Security Analysis Of SPINS Protocol Based On CK Model

Posted on:2013-09-27Degree:MasterType:Thesis
Country:ChinaCandidate:W XueFull Text:PDF
GTID:2248330377460885Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In the information age, people are exhausted of high efficiency and fast-pacedbusiness, thus, those seemingly mean to all security job which though all of itcollapsed. Beause of rapidly rising network security events in these years, thesecurity of wireless network is analyzed and discussed by experts. As one of theimportant application, WSN is widely used in military, industrial, agriculture.Therefore, the security is worth of be researched and solved. The difference fromwired network is physical channel between of WSN is air medium. Usually, theyare distributed in uninhabited and uncontrollable environment. Thence the securitydepends on the protocols. Although some pratical security protocols have beenproposed, these are vulnerable and limited in different WSN applications. Analysisand design of security protocols has become both innovative and challengingresearch topics. With the research of academics and progress in applications,provable security theory that are important results in protocol formal analysiseffectively is used in the analysis and rescerch of the various protocols. In thispaper, CK model which is one of the provable security theories is recommended inSPINS protocol.First of all, network characteristics and security needed to be elaborated.Security of SPINS protocol was discussed preliminarily on this basis. Then,provable security theory was leaded into this paper and introducted briefly. Afterthat, core part of CK model was foused on. By ideal model and real model appliedin SPINS protocol, a new protocol which corresponds to SPINS protocol wasbuilded. Through the formal analysis results of two protocols’ models, securityloopholes which was derived from various attack means, its’semantics andpolynomial security, the conclusion that SPINS protocol was constituted of securitychannel in reality, was derivated.
Keywords/Search Tags:SPINS protocol, Provable Security Theory, CK model, Adversary, Security channel
PDF Full Text Request
Related items