首页 | 本学科首页   官方微博 | 高级检索  
     

基于标识密码的数据报传输层安全协议
引用本文:李鹏坤,王小峰,苏金树,薛天. 基于标识密码的数据报传输层安全协议[J]. 软件学报, 2017, 28(S2): 90-97
作者姓名:李鹏坤  王小峰  苏金树  薛天
作者单位:国防科技大学 计算机学院, 湖南 长沙 410073,国防科技大学 计算机学院, 湖南 长沙 410073,国防科技大学 计算机学院, 湖南 长沙 410073,国防科技大学 计算机学院, 湖南 长沙 410073
基金项目:国家重点研发计划(0802300)
摘    要:TLS作为目前应用最为广泛的安全传输协议,只能保证可靠传输TCP上数据的安全性.DTLS(datagram TLS)在TLS协议架构上进行了修改,能够为UDP提供安全保护.但DTLS在会话建立过程中仍然需要依赖第三方认证中心和证书完成通信双方的认证,连接建立过程时间长,安全开销大,不能满足物联网等资源受限的网络通信环境.将标识密码引入DTLS中,避免了握手协议中处理证书所带来的各种开销,在计算会话密钥的同时完成通信双方的认证;并使用新的密钥协商协议重新设计DTLS的握手协议,减少交互次数和消息数量,缩短连接建立时间.实验结果表明,基于标识密码的DTLS在不降低安全性的同时,将通信建立时间缩短了近50%.

关 键 词:安全协议  标识密码  网络传输协议  密钥协商  认证
收稿时间:2017-06-30

Datagram Transport Layer Security Protocol with Identity-Based Cryptography
LI Peng-Kun,WANG Xiao-Feng,SU Jin-Shu and XUE Tian. Datagram Transport Layer Security Protocol with Identity-Based Cryptography[J]. Journal of Software, 2017, 28(S2): 90-97
Authors:LI Peng-Kun  WANG Xiao-Feng  SU Jin-Shu  XUE Tian
Affiliation:School of Computer, National University of Defense Technology, Changsha 410073, China,School of Computer, National University of Defense Technology, Changsha 410073, China,School of Computer, National University of Defense Technology, Changsha 410073, China and School of Computer, National University of Defense Technology, Changsha 410073, China
Abstract:TLS is the most widely deployed security protocol, however, it can only secure the applications that are based on reliable transport. Datagram TLS (DTLS) is a modified version of the TLS protocol which provides security protection in datagram environments. In DTLS, however, the communication parties need complete authentication though the certification authority when they establish connection. Consequently, the connection establishment process takes long time with a high security overhead, which cannot meet the requirement for resource-constrained network communication environment such as Internet of Things. This paper introduces identify-based cryptography to DTLS. It provides authentication while calculating the session key, and avoids the overhead associated with handling certificates in the handshake protocol. The paper designs a new DTLS handshake protocol, which reduces the number of interactions and messages, and shortens the connection establishment time. Experimental results show that the DTLS with identity-based cryptography reduces the communication setup time by nearly 50% without compromising the security.
Keywords:security protocol  identity-based cryptography  network transport protocol  key agreement  authentication
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号