首页 | 本学科首页   官方微博 | 高级检索  
     

无人机无线通信协议的形式化认证分析与验证
引用本文:刘栋,连晓峰,王宇龙,谭励,赵宇琦,李林.无人机无线通信协议的形式化认证分析与验证[J].计算机测量与控制,2021,29(4):244-250.
作者姓名:刘栋  连晓峰  王宇龙  谭励  赵宇琦  李林
作者单位:北京工商大学人工智能学院,北京 100048;中国兵器工业信息中心,北京 100089;北京工商大学计算机学院,北京 100048
基金项目:装备发展部项目(170341402020)
摘    要:针对无人机组与地面控制站之间进行无线通信时的身份认证问题,首先分析无线通信协议的工作流程及其形式化表示,然后对网络系统中的诚实主体和攻击者进行形式化建模,其中推导了协议安全属性的LTL公式,通过建立密钥机制,实现控制站与无人机节点以及各个无人机节点之间的身份认证;运用模型检测工具SPIN验证无线通信协议的一致性,其中提出一种改进的知识项获取方法,加快攻击者需掌握知识集的求取过程;验证结果表明该无人机无线通信协议具有中间人攻击漏洞。

关 键 词:无人机无线通信协议  形式化表示与建模  模型检测工具SPIN  攻击者知识项获取
收稿时间:2021/2/26 0:00:00
修稿时间:2021/3/4 0:00:00

Formal Authentication Analysis and Verification of UAV Wireless Communication Protocol
Liu Dong,Lian Xiaofeng,Wang Yulong,Tan Li,Zhao Yuqi,Li Lin.Formal Authentication Analysis and Verification of UAV Wireless Communication Protocol[J].Computer Measurement & Control,2021,29(4):244-250.
Authors:Liu Dong  Lian Xiaofeng  Wang Yulong  Tan Li  Zhao Yuqi  Li Lin
Affiliation:(School of Artificial Intelligence,BeijingTechnology and Business University,Beijing 100048,China;China Ordnance Industry Information Center,Beijing 100089,China;School of Computer,Beijing Technology and Business University,Beijing 100048,China)
Abstract:In order to solve the issue of identity authentication in wireless communication between UAV and control station,the workflow of wireless communication protocol as well as formal representation are analyzed firstly.Then the honest agent and attacker agent in the network system are formal modeled,in which the LTL formula of the security attribute of the protocol are derived.The identity authentication between the control station and UAV nodes as well as are implemented by establishing the key mechanism.The consistency of wireless communication protocol is verified by using SPIN,which is a model checking tool.An improved method of acquiring knowledge items is proposed to speed up the process of acquiring knowledge sets for attackers.The verification results show that the UAV wireless communication protocol has intermediary attack vulnerability.
Keywords:UAV wireless communication protocol  formal representation and Modeling  Model Checking Tool SPIN  Attacker Agent Knowledge Acquisition
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机测量与控制》浏览原始摘要信息
点击此处可从《计算机测量与控制》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号