Wireless sensor network (WSN) protocol security test system

A technology of security testing and wireless sensors, applied in the field of network information security, can solve the problem of lack of a unified test system in the field of sensor network protocol security testing

Inactive Publication Date: 2014-04-16
XIDIAN UNIV +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the lack of a unified test system in the field of sensor network protocol security testing, the present invention proposes a sensor network protocol security testing system based on the protocol attack testing method and the protocol consistency testing theory. The testing system is as follows: figure 1 shown

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network (WSN) protocol security test system
  • Wireless sensor network (WSN) protocol security test system
  • Wireless sensor network (WSN) protocol security test system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Based on the wireless sensor network protocol security testing system proposed by the present invention, the wireless sensor network identity authentication protocol TinyPK based on the RSA public key algorithm, the anti-Sybil attack capability is tested for security, and the specific implementation process is as follows:

[0058] 1. Formalized generation components of the protocol body

[0059] The TinyPK protocol adopts a request-response mechanism and requires a CA with a public-private key pair as a trusted third party. Any two entities (external user EP and network node Mote) to establish a trust relationship must have the public-private key pair obtained from the CA and the CA's public key. The entity's public key is signed with the CA's private key as its digital certificate to demonstrate its legal identity. The main body of the TinyPK protocol includes two parties, namely, the external user EP and the network node Mote, and the formalized results Party (1) and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In a wireless sensor network (WSN) protocol security test field, an uniform test system is lacked. Aiming at the above problem, the invention, based on a protocol attack test idea and a protocol consistency test theory, provides a wireless sensor network (WSN) protocol security test system. The system comprises: a protocol subject formalization generation assembly, a protocol attack facing object formalization generation assembly, a comprehensive protocol formalization generation assembly and a security test assembly. The system carries out formal description to behaviors of all participants of the protocol subject and the attack faced by the protocol through a modeling method so as to respectively obtain a formal result. The attack is taken as the normal input behavior of the protocol, and the relatively independent protocol subject formalization result organically combined with the attack behavior formalization result. Finally, according to a protocol consistency test method, the security test to the protocol can be indirectly completed.

Description

technical field [0001] The invention belongs to the technical field of network information security, and relates to a security test system for a wireless sensor network protocol, more specifically, a protocol consistency test theory and a protocol attack test method, using a finite state with an attack object model It is a system for testing the security of the wireless sensor network protocol based on the formal description method of the machine model. Background technique [0002] Wireless Sensor Network (WSN, hereinafter referred to as sensor network) is a cutting-edge research field that has attracted much attention in the world and is highly interdisciplinary. Since the early 1990s, the governments and research institutions of the United States, Japan, Western Europe and many other countries have invested heavily and launched a large number of sensor network research programs. )", the sensor network is taken as the priority subject. In recent years, the National 973 a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L29/06H04W24/00H04W84/18H04W12/00H04W12/121H04W12/122
Inventor 裴庆祺曾勇齐跃吉世瑞王祥李国宏刘晓雷
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products