信息网络安全 ›› 2018, Vol. 18 ›› Issue (5): 32-40.doi: 10.3969/j.issn.1671-1122.2018.05.004

• • 上一篇    下一篇

基于国密SM2数字签名的网络摄像头保护技术

左黎明1,2(), 夏萍萍1,2, 陈祚松1,2   

  1. 1.华东交通大学理学院,江西南昌 330013
    2.华东交通大学系统工程与密码学研究所,江西南昌 330013
  • 收稿日期:2018-02-26 出版日期:2018-05-15 发布日期:2020-05-11
  • 作者简介:

    作者简介:左黎明(1981—),男,江西,副教授,硕士,主要研究方向为信息安全、非线性系统;夏萍萍(1995—),女,江西,硕士研究生,主要研究方向为信息安全;陈祚松(1993—),男,江西,硕士研究生,主要研究方向为信息安全。

  • 基金资助:
    国家自然科学基金[11361024];江西省自然科学基金[20171BAB201009];江西省教育厅科技项目[GJJ161417];江西省研究生创新专项资金[YC2017-S257]

Protection Technology of Network Camera Based on SM2 Digital Signature

Liming ZUO1,2(), Pingping XIA1,2, Zuosong CHEN1,2   

  1. 1. School of Science, East China Jiaotong University, Nanchang Jiangxi 330013, China
    2. Institute of Systems Engineering and Cryptograph, East China Jiaotong University, Nanchang Jiangxi 330013, China
  • Received:2018-02-26 Online:2018-05-15 Published:2020-05-11

摘要:

随着物联网技术的快速发展,智能家居网络慢慢得到普及,然而隐私泄露、数据被恶意篡改等安全问题不断涌现。文章分析了近期网络摄像头出现的典型漏洞,包括弱默认凭证漏洞、认证绕过漏洞、内建WebShell的利用和专用协议远程控制漏洞,并针对目前网络摄像头系统出现的安全登录方面的问题,提出了基于SM2数字签名的摄像头管理系统登录身份验证协议,根据协议实现中的密钥处理方式不同,提出了有电子钥匙和无电子钥匙两种方案。在有电子钥匙的情况下,电子钥匙作为安全密钥容器;当无电子钥匙时,提供一种基于口令的密钥方案解决了密钥管理问题。最后,文章利用Raspberry Pi 3B开发板构建一个实验仿真平台,并在C/S、B/S和APP/S架构下实现了该身份认证协议。仿真实验表明,文中方案能够有效防止针对登录口令的嗅探攻击。

关键词: 网络摄像头, 电子钥匙, SM2, 数字签名, 嗅探

Abstract:

With the rapid development of Internet of things (IOT) technology, smart home network is gradually popularizing. However, security problems such as privacy leaks and malicious tampering of data are emerging constantly. The typical vulnerabilities of recent network camera are analyzed, including weak default credential vulnerabilities, authentication bypass vulnerabilities, use of built-in WebShell and proprietary protocol remote control vulnerabilities, and the intrusion access control for a network camera is implemented. Aiming at the security logins problems for current network camera system, the login authentication protocol of camera management system based on SM2 digital signature is proposed. According to the different key processing methods in the protocol implementation, two schemes of electronic key and no electronic key are proposed. In the case of an electronic key, the electronic key is used as a security key container. When there is no electronic key, a password-based key scheme is provided to solve the key management problem. Finally, an experimental simulation platform is constructed by using Raspberry Pi 3B development board. The authentication protocol is implemented under the framework of C/S, B/S and APP/S. Simulation results show that this scheme can effectively prevent sniffing attacks against login passwords.

Key words: network camera, electronic key, SM2, digital signature, sniffer

中图分类号: