信息网络安全 ›› 2019, Vol. 19 ›› Issue (10): 16-23.doi: 10.3969/j.issn.1671-1122.2019.10.003

• 技术研究 • 上一篇    下一篇

基于短距离无线通信的物联网智能锁安全机制研究

金志刚, 吴桐, 李根()   

  1. 天津大学电气自动化与信息工程学院,天津 300072
  • 收稿日期:2019-06-15 出版日期:2019-10-10 发布日期:2020-05-11
  • 通讯作者: 李根 E-mail:ligen@tju.edu.cn
  • 作者简介:

    作者简介:金志刚(1972—),男,上海,教授,博士,主要研究方向为水下传感器网络、网络安全、社交网络与大数据;吴桐(1997—),男,辽宁,硕士研究生,主要研究方向为区块链技术、网络安全、水下无线传感器;李根(1984—),男,天津,工程师,博士,主要研究方向为车联网、网络安全与区块链。

  • 基金资助:
    国家自然科学基金[61571318];中国博士后科学基金[2016M601265]

Research on Internet of Things Security Mechanism Based on Short Distance Wireless Communication

Zhigang JIN, Tong WU, Gen LI()   

  1. School of Electrical and Information Engineering, Tianjin University, Tianjin 300072, China
  • Received:2019-06-15 Online:2019-10-10 Published:2020-05-11
  • Contact: Gen LI E-mail:ligen@tju.edu.cn

摘要:

物联网领域中应用了大量的无线通信技术,由于成本等原因,其安全问题却往往被忽视。针对短距离无线通信技术在物联网设备中暴露出来的安全性问题,文章以目前物联网领域中广泛使用的智能锁为研究对象,分析了以低功耗蓝牙为例的短距离无线通信技术在物联网智能锁安全机制中的运用,使用协议分析与安全模型解析等方法研究了物联网智能锁现阶段存在的安全漏洞。同时举例描述了潜在的对物联网智能锁进行远程攻击的方法,基于CPN模型分析了物联网智能锁对非法重放攻击以及窃听攻击的抵抗性,并针对安全漏洞提出了相应的改进方法。通过利用CPN模型对加固后的通信模型进行分析,证明该模型可有效抵御非法重放攻击以及窃听攻击。

关键词: 短距离无线通信, 智能锁, 低功耗蓝牙, CPN

Abstract:

A large number of wireless communication technologies are nowapplied in the Internet of Things field, and the security problems therein are often neglected due to cost and the like. Aiming at the security problems exposed by shortdistance wireless communication technology in IoT devices, this paper takes the smart locks which are widely used in the field of Internet of Things as the research object, and analyzes the short distance wireless communication technology with Bluetooth Low Energy as an example. The application of IoT smart lock security mechanism, using protocol analysis and security model analysis, etc., studied the security vulnerabilities existing in the IoT smart lock. The method of remote attack on IoT smart lock is described by example. Based on CPN model, the resistance of IoT smart lock to illegal replay attacks and eavesdropping attacks is analyzed, and corresponding improvement methods are proposed for security vulnerabilities. The CPN model is used to analyze the reinforced communication model to prove that it can resist the resistance to illegal replay attacks and eavesdropping attacks.

Key words: short distance wireless communication, smart lock, BLE, CPN

中图分类号: