Font Size: a A A

Research On Key Technologies Of Multi-party Secure Communication In WSN Networks

Posted on:2024-04-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y LiuFull Text:PDF
GTID:2568307079471234Subject:Electronic information
Abstract/Summary:PDF Full Text Request
Wireless sensor networks are gradually integrated into various fields at an alarming rate,involving all aspects of human life,which greatly facilitates human life.Unfortunately,the growing security concerns of wireless sensor networks have become a huge challenge.For many security issues in wireless sensor networks,such as user anonymity,forward secrecy and message integrity,although there are a large number of user authentication and key agreement(AKA)protocols used to solve these issues,these protocols are caught in a “break-fix-break-fix”cycle.One important reason is that the current formal analysis methods and verification tools used for security analysis are insufficient to analyze multiple security attributes,while the informal method for analyzing multiple security attributes has the problem of lacking credibility in the analysis process due to the impact of the subjective experience of the analyst? Another important reason is that with the enhancement of adversary capabilities and the emergence of new attack methods,previous protocols do not meet the security and availability issues.Therefore,this thesis aims at the two important issues mentioned above,and studies them as follows.1.Research on formal methods: In response to the problems between the current formal methods/verification tools and informal method to security protocols,this thesis first proposes a formal analysis method for AKA protocols suitable for two common network models based on predicate logic.This formal method starts from the protocol’s content,involving the messages sent and received by the protocol,as well as the related calculation processes.It uses predicate logic to formalize the security model and protocol,and provides corresponding propositions as prerequisites.Then,it can achieve the purpose of analyzing multiple security attributes and compensate for the shortcomings of informal analysis method by using natural deductive inference rules for deductive inference.Finally,the protocol of Banerjee et al.is used to further illustrate the availability of the formal analysis method proposed in this thesis.2.Research on AKA protocol: With the enhancement of adversary capabilities and the emergence of new attack methods,the existing AKA protocols cannot meet the security and usability.Hence,this thesis extends the representative security model(Wang et al.’s security model),taking into account the adversary capabilities and evaluation criteria of the newly emerging Known Session Specific Temporary Information(KSSTI)attack.Under this security model,an efficient and secure AKA protocol is constructed based on the uncommon three-message model.The protocol uses efficient Chebyshev polynomials to construct Diffie-Hellman mathematical difficulties to achieve security such as user anonymity and forward secrecy,etc.Finally,this thesis uses BAN logic and the formal method proposed in this thesis to conduct a security analysis on the proposed protocol,and compares it with related protocols in terms of security and usability.As a result,our proposed protocol not only satisfies all the security attributes but also has relatively low computational overhead and communication overhead.Moreover,it also fails Wang et al.’s conclusion that the three-message model cannot achieve mutual authentication.
Keywords/Search Tags:Wireless Sensor Networks, Formal Analysis Method, Predicate Logic, User Authentication and Key Agreement, Chebyshev Polynomials
PDF Full Text Request
Related items