• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

基于散列时间有效性的轻量级完整性监测方法

徐钦桂, 秦勇, 杨桃栏

徐钦桂, 秦勇, 杨桃栏. 基于散列时间有效性的轻量级完整性监测方法[J]. 计算机研究与发展, 2015, 52(3): 702-717. DOI: 10.7544/issn1000-1239.2015.20131382
引用本文: 徐钦桂, 秦勇, 杨桃栏. 基于散列时间有效性的轻量级完整性监测方法[J]. 计算机研究与发展, 2015, 52(3): 702-717. DOI: 10.7544/issn1000-1239.2015.20131382
Xu Qingui, Qin Yong, Yang Taolan. Light-Weight Integrity Monitoring Based on Hashing Time Validity[J]. Journal of Computer Research and Development, 2015, 52(3): 702-717. DOI: 10.7544/issn1000-1239.2015.20131382
Citation: Xu Qingui, Qin Yong, Yang Taolan. Light-Weight Integrity Monitoring Based on Hashing Time Validity[J]. Journal of Computer Research and Development, 2015, 52(3): 702-717. DOI: 10.7544/issn1000-1239.2015.20131382
徐钦桂, 秦勇, 杨桃栏. 基于散列时间有效性的轻量级完整性监测方法[J]. 计算机研究与发展, 2015, 52(3): 702-717. CSTR: 32373.14.issn1000-1239.2015.20131382
引用本文: 徐钦桂, 秦勇, 杨桃栏. 基于散列时间有效性的轻量级完整性监测方法[J]. 计算机研究与发展, 2015, 52(3): 702-717. CSTR: 32373.14.issn1000-1239.2015.20131382
Xu Qingui, Qin Yong, Yang Taolan. Light-Weight Integrity Monitoring Based on Hashing Time Validity[J]. Journal of Computer Research and Development, 2015, 52(3): 702-717. CSTR: 32373.14.issn1000-1239.2015.20131382
Citation: Xu Qingui, Qin Yong, Yang Taolan. Light-Weight Integrity Monitoring Based on Hashing Time Validity[J]. Journal of Computer Research and Development, 2015, 52(3): 702-717. CSTR: 32373.14.issn1000-1239.2015.20131382

基于散列时间有效性的轻量级完整性监测方法

基金项目: 国家自然科学基金项目(61300198);广东省自然科学基金项目(S2013010011858);广东省科技计划基金项目(2007A060304003);东莞市高等院校科研机构科技计划基金项目(2012108102035,2012108102007);清远市产学研项目(2012D021212005);广东省高等学校学科与专业建设专项基金项目(2050205)
详细信息
  • 中图分类号: TP309.1;TP393.08

Light-Weight Integrity Monitoring Based on Hashing Time Validity

  • 摘要: 实时监测节点完整性状态是资源受限节点安全保护的有效手段.分析针对资源受限节点的主要篡改攻击模式及对散列时间带来的影响,提出基于散列时间有效性检验的纯软件完整性监测手段.基于对散列时间有效性可检验条件分析,提出采用验证值伪造惩罚系数描述散列模块抗篡改能力,设计一种融入程序状态的轻量级散列算法,通过简化算法结构与融入程序状态,增大验证值伪造难度,提高验证值伪造惩罚系数.设计支持消息认证的监测协议防止消息伪造,基于验证值比较与散列时间有效性统计,判定节点完整性状态.实验结果表明:该方案以微小的节点开销为代价,获得了更高的散列时间有效性检验可靠性,增强了对散列时间与消息传输时间波动干扰的容忍能力,提高了资源受限节点防篡改攻击性能.
    Abstract: Real-time monitoring of node integrity is effective means to protect resource-restrained nodes. By identifying main tampering attack modes against resource-restrained nodes, and analysiing the influence on hashing time, pure-software integrity monitoring means based on inspecting hashing time validity is suggested. On the basis of analysing testability condition of hashing time validity, checksum forging punishment coefficient is proposed to indicate tamper-resisting performance of monitor mechanism, and a light-weight hashing algorithm of merging program states is put forward. By simplifying hashing structure and integrating program states into checksum, checksum forging is made more difficult. Damaged nodes have to spend much more time on extra work like restoring legal code and program states than on hashing if they want to aquire the correct checksum. Hence, the proposed mechanism imposes much greater checksum forging punishment on damaged nodes than other approaches like SWATT and Shah. In order to prevent message forging or tampering during transmission over communication networks, a monitoring protocol supporting message authentication is designed. For tolerating influence from hashing time fluctuation and checksum guess, node integrity state is evaluated from results of both checksum comparison and hashing time validity statistics. The experiments show that the proposed approach achieves high reliabiliy in examining validity of checksum and hashing time with small cost. Toleration ability against fluctuation disturbance on hashing time from node multi-tasking environment and communication networks is improved, and hence tamper-resisting performance of resource-constrained nodes is enhanced.
  • 期刊类型引用(1)

    1. 夏伟,蔡文婷,刘阳. 基于图数据库的中压配电网网格搜索引擎系统. 电测与仪表. 2024(11): 182-188 . 百度学术

    其他类型引用(1)

计量
  • 文章访问数:  1050
  • HTML全文浏览量:  1
  • PDF下载量:  685
  • 被引次数: 2
出版历程
  • 发布日期:  2015-02-28

目录

    /

    返回文章
    返回