物联网环境下轻量级双向安全认证协议级联漏洞检测
CSTR:
作者:
作者单位:

作者简介:

通讯作者:

中图分类号:

基金项目:

山西省基础研究计划 (202403021221180); 教育部产学合作协同育人项目 (221002722062521); 山西大同大学教学改革项目 (XJG2023269)


Lightweight Bidirectional Security Authentication Protocol Cascade Vulnerability Detection in the IoT Environment
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    在物联网环境中, 由于资源受限, 设备采用随机的节能策略, 如动态睡眠机制, 导致协议交互时序出现不可预测的断开/重连行为. 这种行为使得传统的有限状态机模型难以充分描述状态转换路径, 进而降低了协议一致性偏差的检测率, 并增加了级联漏洞检测的漏检率. 为了解决这一问题, 本文提出了一种轻量级双向安全认证协议级联漏洞检测方法. 该方法利用图卷积网络对物联网环境中轻量级双向安全认证协议的交互图进行建模, 并结合漏洞特征向量计算余弦相似度以进行状态关联检测. 通过动态图建模, 捕获间断通信特征, 并结合余弦相似度量化协议状态与漏洞模式之间的时空关联, 有效克服了节能策略对漏洞检测造成的时间不确定性影响. 基于关联检测结果, 使用马尔可夫决策过程量化漏洞传播的依赖关系, 并构建状态转移概率矩阵来表征拓扑动态. 基于依赖关系, 采用图注意力网络将传播概率转化为节点属性, 并使用多头注意力机制聚合邻居信息. 最终, 结合全局池化实现级联漏洞分类. 实验结果表明, 本文提出的方法在漏洞检测方面具有良好的准确性, 协议一致性偏差稳定在0.12–0.21范围内, 漏检率始终低于0.5%, 展现出理想的检测效果.

    Abstract:

    In the Internet of Things (IoT) environment, resource-limited devices adopt random energy-saving strategies, such as dynamic sleep mechanisms, which lead to unpredictable disconnection and reconnection behaviors in protocol interaction timing. Such behavior makes it difficult for traditional finite state machine models to fully describe the state transition path, thereby reducing the detection rate of protocol consistency deviation and increasing the missed detection rate of cascade vulnerabilities. To address this problem, a lightweight bidirectional security authentication protocol cascade vulnerability detection method is proposed. Graph convolutional networks are employed to model the interaction graphs of lightweight bidirectional security authentication protocols in the Internet of Things environment, and cosine similarity is calculated based on vulnerability feature vectors to perform state association detection. Through dynamic graph modeling, intermittent communication characteristics are captured, and cosine similarity is used to quantify the spatiotemporal correlation between protocol states and vulnerability patterns, which effectively mitigates the impact of temporal uncertainty caused by energy-saving strategies on vulnerability detection. Based on the results of association detection, a Markov decision process is adopted to quantify the dependency relationships of vulnerability propagation, and a state transition probability matrix is constructed to characterize topological dynamics. According to the dependency relationships, a graph attention network is utilized to transform propagation probabilities into node attributes, and a multi-head attention mechanism is employed to aggregate neighboring information. Ultimately, cascade vulnerability classification is achieved by combining global pooling. The experimental results show that the proposed method achieves good accuracy in vulnerability detection. The protocol consistency deviation remains stable within the range of 0.12–0.21, and the missed detection rate is consistently lower than 0.5%, demonstrating effective detection performance.

    参考文献
    相似文献
    引证文献
引用本文

张杰,景雯,王强.物联网环境下轻量级双向安全认证协议级联漏洞检测.计算机系统应用,,():1-7

复制
分享
相关视频

文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2025-08-26
  • 最后修改日期:2025-10-10
  • 录用日期:
  • 在线发布日期: 2026-03-13
  • 出版日期:
文章二维码
您是第位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62661041 传真: Email:csa@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号