期刊文献+

一种增强的DTLS密钥交换协议 被引量:2

An Enhanced DTLS Key Exchange Protocol
在线阅读 下载PDF
导出
摘要 数据报传输层安全(Datagram Transport Layer Security,DTLS)协议基于用户数据报(User Datagram Protocol,UDP)协议套接字(socket),在传输层和应用层之间构建了一个端到端的安全通道,保证了传输数据的机密性。DTLS提供了基于椭圆曲线迪菲-赫尔曼(Elliptic Curve Diffie-Hellman,ECDH)和预共享密钥(Pre-Shared Key,PSK)两种密钥交换协议,前者安全性好但耗时长开销大,后者效率高但安全级别低。因此,在ECDH和PSK基础上,提出了一种增强的密钥交换协议,该协议在不改变密钥交换流程且不增加网络传输开销的前提下,通过PSK存储于密钥池以及使用时动态选取和使用后滚动更新的方式,有效地抵御了前向和后向安全攻击,并避免了数据被窃听或篡改。 Based on UDP(User Datagram Protocol)socket,the DTLS(Datagram Transport Layer Security)protocol constructs an end-to-end secure channel between transport layer and application layer to ensure the encryption of transmitted data.DTLS provides two key exchange protocols based on ECDH(Elliptic Curve Diffie-Hellman)and PSK(Pre-Shared Key).The former has good security but long time-consuming and high overhead,and the latter has high efficiency but low security level.Therefore,based on ECDH and PSK,an enhanced key exchange protocol is proposed.Without changing the key exchange process and increasing the network transmission overhead,the protocol effectively resists eavesdropping,tampering,forward and backward security attacks by storing PSK keys in the key pool,dynamically selecting them during use and rolling up grade them after use.
作者 黄劲松 代霞 HUANG Jinsong;DAI Xia(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
出处 《通信技术》 2022年第2期229-235,共7页 Communications Technology
关键词 数据报传输层安全 椭圆曲线迪菲-赫尔曼 预共享密钥 密钥交换 安全攻击 DTLS(Datagram Transport Layer Security) ECDH(Elliptic Curve Diffie-Hellman) PSK(Pre-Shared Key) key exchange security attack
  • 相关文献

参考文献5

二级参考文献18

  • 1[美]EricRescorla著,崔凯.SSL与TLS[M]中国电力出版社,2002.
  • 2KEOH S L, KUMAR S S, TSCHOFENIG H. Securing the Internet of Things: a standardization perspective[J]. IEEE Internet of ThingsJournal ,2014,1 (3) :265 - 275.
  • 3VUCINIC M,TOURANCHEAU B,ROUSSEAU F. OSCAR: object security architecture for the Internet of Things[J] . Ad Hoc Networks,2015,32(SI):3 -16.
  • 4RAZA S, TRABALZA D, VOIGT T. 6Lo WPAN compressed DTLS for CoAP[CJ //IEEE DCOSS. 2012:287 -289.
  • 5ROMAN R,NAJERA P ,LOPEZJ. Securing the Internet of Things[J]. IEEEJournals & Magazines, 2011,44 (9) : 51 - 58.
  • 6GRANJALJ ,MONTEIRO E,SILVAJ. Security for the Internet of Things: a survey of existing protocols and open research issues[J] . IEEE Communication Surveys & Tutorials ,2015, 17( 3) : 1294 -1312.
  • 7LI F , XIONG P. Practical secure communication for integrating wireless sensor networks into the Internet of Things[J]. IEEE SensorsJoural,2013,13(1O) :3677 -3684.
  • 8FREMANTLE P, AZIZ B, KOPECKYJ. Federated identity and access management for the Internet of Things[CJ / / SIoT.2014:1O-17.
  • 9RAZA S, SHAF AGH H, HEWAGE K. Lithe: lightweight secure CoAP for the Internet of Things[J]. IEEE SensorsJournal,2013,13(1O) :3711 -3720.
  • 10KOTHMAYR T,SCHMITT C,HU W. A DTLS based endto-end security architecture for the internet of things with two-way authentication] CJ //IEEE LCN Workshops. 2012: 956 -963.

共引文献12

同被引文献15

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部