基于用户属性的远程证明协议的形式化研究
[Abstract]:Nowadays, with the rapid development of information technology, the network goes deep into people's lives. Online shopping is becoming more and more popular, more and more people carry out financial transactions through online payment, and companies manage the company's internal information and data sharing through a variety of internal networks. Cloud computing provides users with a wide range of network security services. The payment account and password of people's financial transactions, the important confidential documents and data of the company, and the user data in the cloud environment all involve the processing of confidential and important data. Because of the openness and complexity of modern networks, this data is easily collected and attacked by attackers, who can intercept users' financial accounts and passwords during communication. Can maliciously attack the company's terminal or server to steal important information and data, and so on. Therefore, before carrying out all kinds of secure operations of the network, the communication entities in the network need to verify and confirm each other's identity and configuration information in order to ensure the security of their own platform. The trusted platform TPM and remote certification protocol proposed by the trusted computing organization. It can effectively prevent such attacks based on trusted computing. The remote certification protocol provides trusted data to ensure the security of the communication entity in the network, to ensure the legitimacy of the identity of the platform interacting with the communication entity and the reliability of the software running on the platform, so the remote certification protocol pays securely in the network, Network terminal access and trusted cloud service have important applications, which can prevent the leakage of important data. In the mobile phone payment, the remote proof protocol can provide the configuration information and credibility of the mobile phone user for the financial server, and can verify the terminal equipment of the accessed system for the trusted network. You can verify the identity and integrity of cloud nodes for cloud service systems. In this paper, the formal analysis of the complete remote certification protocol is carried out, and the main work is as follows: (1) the remote certification protocol is analyzed. The formal analysis of the protocol is carried out by using SPIN model detection tool according to the process of remote certification protocol and the security objectives to be satisfied, and the remote certification protocol is analyzed mainly from the point of view of user process User and remote verifier Verifier. It is found that the protocol is vulnerable to replay attack, camouflage attack and sabotage attack. The attack paths detected by SPIN include destroying PrivacyCA authentication, destroying user User authentication, destroying remote verifier Verifier authentication and destroying user metric log ML confidentiality. It is concluded that there are security vulnerabilities in the protocol. (2) the user attribute is used to improve the protocol, and the improved protocol is formally analyzed by using the method of user attribute plus salt SHUA (Secure Hash with User Attributes Algorithm) to prove the legal identity of the User platform. Use User unique properties to add to the protocol for transmission. At the same time, SVO logic analysis method and SPIN model detection tool are used to formalize the improved remote proof protocol based on user attributes. SVO logic forward analysis shows that the protocol meets the security authentication goal. SPIN reverse analysis shows that the attack path of the improved protocol has been eliminated, and the security of the protocol has been improved. (3) the protocol prototype is designed to test the energy consumption of the protocol, and the APK file is generated. PowerTutor tool is used to test the energy consumption of CPU,LED communication. The experimental results show that the overall energy consumption of the protocol is not high, and it is light to be used in mobile payment.
【学位授予单位】:太原理工大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP309
【参考文献】
相关期刊论文 前10条
1 肖美华;朱科;马成林;;基于SPIN的Andrew Secure RPC协议并行攻击模型检测[J];计算机科学;2015年07期
2 冯伟;冯登国;;基于串空间的可信计算协议分析[J];计算机学报;2015年04期
3 张晓伟;王峥;陈永乐;;一种基于用户属性的远程证明方案[J];太原理工大学学报;2015年02期
4 田野;彭彦彬;杨玉丽;彭新光;;无线体域网中基于属性加密的数据访问控制方案[J];计算机应用研究;2015年07期
5 冉俊轶;吴尽昭;;基于Spin的安全协议形式化验证技术[J];计算机应用;2014年S2期
6 肖茵茵;苏开乐;;电子商务支付协议认证性的SVO逻辑验证[J];计算机工程与应用;2014年08期
7 闫建红;;一种基于属性证书的动态可信证明机制[J];小型微型计算机系统;2013年10期
8 范玉涛;苏桂平;;一种含时间因素的安全协议形式化分析方法[J];计算机应用与软件;2013年01期
9 谯婷婷;王乐;王芳;葛艳;;基于Coq的软件安全性验证[J];计算机应用;2012年S2期
10 尤启房;杨晋吉;;SIP协议的SPIN模型检测[J];计算机工程与应用;2014年13期
相关博士学位论文 前2条
1 付东来;基于可信平台模块的远程证明关键技术研究及其应用[D];太原理工大学;2016年
2 鲁来凤;安全协议形式化分析理论与应用研究[D];西安电子科技大学;2012年
相关硕士学位论文 前1条
1 刘俏威;SPIN模型检测的形式化分析机理研究及应用[D];南昌大学;2008年
,本文编号:2481117
本文链接:https://www.wllwen.com/shoufeilunwen/xixikjs/2481117.html