As an indispensable part of the Intelli-gent Transportation System(ITS),the vehicular ad-hoc network(VANET)has attracted widespread atten-tion from academia and industry.In order to ensure the security of VANET,vehicl...As an indispensable part of the Intelli-gent Transportation System(ITS),the vehicular ad-hoc network(VANET)has attracted widespread atten-tion from academia and industry.In order to ensure the security of VANET,vehicles need to be authen-ticated before accessing the network.Most existing authentication protocols in VANET adopt the Trusted Authority(TA)with centralized structure which is re-sponsible for the authentication tasks of all vehicles.However,the large-scale network consume a lot of computing resources,which leads to unacceptable de-lay in message transmission in VANET.For reducing the computational cost of TA,an efficient three-factor privacy-preserving authentication and key agreement protocol was proposed in our paper.Different from before,the RoadSide Unit(RSU)no longer acts as an intermediate node but is responsible for assisting user authentication,which lead to the computational cost of TA is very low.Through formal and informal analysis,our protocol demonstrates excellent security.Com-pared with previous studies,our work emerges advan-tages and superiorities in the following aspects:com-putational cost,communication cost,security proper-ties and functions,message loss ratio,and message de-lay.These data and evidence indicate that our protocol is an ideal choice for large-scale VANET.展开更多
Wireless sensor networks (WSNs) are used to monitor various environmental conditions including movement, pollution level, temperature, humidity, and etc. Secure authentication is very important for the success of WSNs...Wireless sensor networks (WSNs) are used to monitor various environmental conditions including movement, pollution level, temperature, humidity, and etc. Secure authentication is very important for the success of WSNs. Li <i>et al</i>. proposed a three-factor anonymous authentication scheme in WSNs over Internet of things (IoT). They argued that their authentication scheme achieves more security and functional features, which are required for WSNs over IoT. Especially, they insisted that their user authentication scheme provides security against sensor node impersonation attack, and resists session-specific temporary information attack and various other attacks. However, this paper shows some security weaknesses in Li <i>et al</i>.’s scheme, especially focused on sensor node masquerading attack, known session-specific temporary information attack and deficiency of perfect forward secrecy. Especially, security considerations are very important to the modern IoT based applications. Thereby, the result of this paper could be very helpful for the IoT security researches.展开更多
Multi-server authenticated key agreement schemes have attracted great attention to both academia and industry in recent years.However,traditional authenticated key agreement schemes in the single-server environment ar...Multi-server authenticated key agreement schemes have attracted great attention to both academia and industry in recent years.However,traditional authenticated key agreement schemes in the single-server environment are not suitable for the multi-server environment because the user has to register on each server when he/she wishes to log in various servers for different service.Moreover,it is unreasonable to consider all servers are trusted since the server in a multi-server environment may be a semi-trusted party.In order to overcome these difficulties,we designed a secure three-factor multi-server authenticated key agreement protocol based on elliptic curve cryptography,which needs the user to register only once at the registration center in order to access all semi-trusted servers.The proposed scheme can not only against various known attacks but also provides high computational efficiency.Besides,we have proved our scheme fulfills mutual authentication by using the authentication test method.展开更多
片上系统(System on Chip,SoC)芯片会针对产品固件进行SM2签名和验签,以确定产品固件的合法性,但现有技术中产品固件未对芯片进行身份鉴别,由于无法确定芯片是否合法,产品固件和数据的安全性得不到保护。基于SM2算法,针对SoC安全芯片中...片上系统(System on Chip,SoC)芯片会针对产品固件进行SM2签名和验签,以确定产品固件的合法性,但现有技术中产品固件未对芯片进行身份鉴别,由于无法确定芯片是否合法,产品固件和数据的安全性得不到保护。基于SM2算法,针对SoC安全芯片中产品固件导入过程,实现了基于国产密码SM2算法的芯片鉴别固件、固件鉴别芯片的双向身份鉴别技术。方案安全性高、可实现性强,对SoC安全芯片对引导程序、产品固件进行双向身份鉴别有普遍现实借鉴意义。所设计的SM2模块,具有芯片面积小、电路设计难度小、CPU操作简单、适用于嵌入式SoC安全芯片等优点。展开更多
智能电表作为新型电力终端,在支持双向通信的基础上面临严峻的数据安全挑战。为解决通信安全问题,提出基于互联网协议第6版(Internet Protocol Version 6,IPv6)协议栈结构的智能电表双向通信安全机制,构建包括数据加密、身份认证、安全...智能电表作为新型电力终端,在支持双向通信的基础上面临严峻的数据安全挑战。为解决通信安全问题,提出基于互联网协议第6版(Internet Protocol Version 6,IPv6)协议栈结构的智能电表双向通信安全机制,构建包括数据加密、身份认证、安全协议设计以及完整性校验在内的多层安全体系。设计过程中引入轻量级加密算法与多因子认证逻辑,匹配智能电表资源受限特征,并实现安全模块在嵌入式环境下的集成部署。实验测试在IPv6仿真平台上完成,验证机制在数据传输安全性与系统性能间达成平衡。研究成果有助于推动智能配电终端的安全通信模型构建。展开更多
基金the National Natural Sci-ence Foundation of China under Grant No.61772185.
文摘As an indispensable part of the Intelli-gent Transportation System(ITS),the vehicular ad-hoc network(VANET)has attracted widespread atten-tion from academia and industry.In order to ensure the security of VANET,vehicles need to be authen-ticated before accessing the network.Most existing authentication protocols in VANET adopt the Trusted Authority(TA)with centralized structure which is re-sponsible for the authentication tasks of all vehicles.However,the large-scale network consume a lot of computing resources,which leads to unacceptable de-lay in message transmission in VANET.For reducing the computational cost of TA,an efficient three-factor privacy-preserving authentication and key agreement protocol was proposed in our paper.Different from before,the RoadSide Unit(RSU)no longer acts as an intermediate node but is responsible for assisting user authentication,which lead to the computational cost of TA is very low.Through formal and informal analysis,our protocol demonstrates excellent security.Com-pared with previous studies,our work emerges advan-tages and superiorities in the following aspects:com-putational cost,communication cost,security proper-ties and functions,message loss ratio,and message de-lay.These data and evidence indicate that our protocol is an ideal choice for large-scale VANET.
文摘Wireless sensor networks (WSNs) are used to monitor various environmental conditions including movement, pollution level, temperature, humidity, and etc. Secure authentication is very important for the success of WSNs. Li <i>et al</i>. proposed a three-factor anonymous authentication scheme in WSNs over Internet of things (IoT). They argued that their authentication scheme achieves more security and functional features, which are required for WSNs over IoT. Especially, they insisted that their user authentication scheme provides security against sensor node impersonation attack, and resists session-specific temporary information attack and various other attacks. However, this paper shows some security weaknesses in Li <i>et al</i>.’s scheme, especially focused on sensor node masquerading attack, known session-specific temporary information attack and deficiency of perfect forward secrecy. Especially, security considerations are very important to the modern IoT based applications. Thereby, the result of this paper could be very helpful for the IoT security researches.
基金This work is supported by the Sichuan education department research project(No.16226483)Sichuan Science and Technology Program(No.2018GZDZX0008)+1 种基金Chengdu Science and Technology Program(No.2018-YF08-00007-GX)the National Natural Science Foundation of China(No.61872087).
文摘Multi-server authenticated key agreement schemes have attracted great attention to both academia and industry in recent years.However,traditional authenticated key agreement schemes in the single-server environment are not suitable for the multi-server environment because the user has to register on each server when he/she wishes to log in various servers for different service.Moreover,it is unreasonable to consider all servers are trusted since the server in a multi-server environment may be a semi-trusted party.In order to overcome these difficulties,we designed a secure three-factor multi-server authenticated key agreement protocol based on elliptic curve cryptography,which needs the user to register only once at the registration center in order to access all semi-trusted servers.The proposed scheme can not only against various known attacks but also provides high computational efficiency.Besides,we have proved our scheme fulfills mutual authentication by using the authentication test method.
文摘片上系统(System on Chip,SoC)芯片会针对产品固件进行SM2签名和验签,以确定产品固件的合法性,但现有技术中产品固件未对芯片进行身份鉴别,由于无法确定芯片是否合法,产品固件和数据的安全性得不到保护。基于SM2算法,针对SoC安全芯片中产品固件导入过程,实现了基于国产密码SM2算法的芯片鉴别固件、固件鉴别芯片的双向身份鉴别技术。方案安全性高、可实现性强,对SoC安全芯片对引导程序、产品固件进行双向身份鉴别有普遍现实借鉴意义。所设计的SM2模块,具有芯片面积小、电路设计难度小、CPU操作简单、适用于嵌入式SoC安全芯片等优点。
文摘智能电表作为新型电力终端,在支持双向通信的基础上面临严峻的数据安全挑战。为解决通信安全问题,提出基于互联网协议第6版(Internet Protocol Version 6,IPv6)协议栈结构的智能电表双向通信安全机制,构建包括数据加密、身份认证、安全协议设计以及完整性校验在内的多层安全体系。设计过程中引入轻量级加密算法与多因子认证逻辑,匹配智能电表资源受限特征,并实现安全模块在嵌入式环境下的集成部署。实验测试在IPv6仿真平台上完成,验证机制在数据传输安全性与系统性能间达成平衡。研究成果有助于推动智能配电终端的安全通信模型构建。