Loading…
Security Enhancement Technology for Power Internet of Things Protocol and Vulnerability Mining of Edge Devices Based on Fuzz Testing
In order to solve the security problems such as the lack of secure key management in the electric Internet of Things protocol, this paper studies the security enhancement technology of electric Internet of Things protocol based on lightweight cryptography technology and new trusted technology. A key...
Saved in:
Main Authors: | , , , , , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 6 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Liu, Donglan Liu, Xin Chang, Yingxian Chen, Jianfei Zhang, Fangzhe Wang, Rui Zhang, Hao Sun, Lili Zhao, Fuhui Sun, Mengqian |
description | In order to solve the security problems such as the lack of secure key management in the electric Internet of Things protocol, this paper studies the security enhancement technology of electric Internet of Things protocol based on lightweight cryptography technology and new trusted technology. A key exchange scheme based on lightweight cryptography technology is proposed to adapt to the resource-limited scenario of the Internet of Things. To protect keys and data on restricted devices and remote servers, explore lightweight cryptography and new trusted technologies. Performs cryptographic operations without exposing the private key and is resistant to tampering and probing attacks. To realize end-to-end communication and key management between Internet of Things devices and remote servers. At the same time, based on the fuzz testing technology, the unknown vulnerability mining technology of the edge device protocol of the electric Internet of Things is carried out. Firstly, the fuzz testing case intelligent optimization method is studied, and the test case set is reduced based on artificial intelligence algorithms such as genetic algorithm, protocol state machine and stain algorithm, so as to improve the test efficiency. Then, the unknown vulnerability discovery method based on state monitoring is studied, and the test case can be judged whether abnormal occurs by monitoring the state of returned data packets of the tested object, so as to determine whether there are vulnerabilities. Finally, the method of vulnerability intelligent location based on automatic location analysis is studied to accurately locate the test cases that cause vulnerability. |
doi_str_mv | 10.1109/ICEIEC58029.2023.10199571 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_10199571</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10199571</ieee_id><sourcerecordid>10199571</sourcerecordid><originalsourceid>FETCH-LOGICAL-i119t-ed0016726fd171e8b13e47108d58a865037731401fd884271901c394f37d35e3</originalsourceid><addsrcrecordid>eNo1kMFKw0AURUdBsGj_wMX4AanvZZLOzFJjqoGKBYO4K2nmpR1JZ2SSKu3aDzdFXd3N4V7OZewaYYII-qbI8iLPUgWxnsQQiwkCap1KPGFjLbUSKQiBEuQpG8VCykglyds5G3fdOwAI1ACJGrHvF6p3wfZ7nrtN5Wrakut5SfXG-dav97zxgS_8FwVeuJ6Co577hpcb69YdXwTf-9q3vHKGv-5aR6Fa2fZY92TdgBzZ3KyJ39Onranjd1VHhnvHZ7vDYdjp-oG6ZGdN1XY0_ssLVs7yMnuM5s8PRXY7jyyi7iMyADiV8bQxKJHUCgUlEkGZVFVqOghLKTABbIxSSSwHR6yFThohjUhJXLCr31pLRMuPYLdV2C__fxM_HvNjIQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security Enhancement Technology for Power Internet of Things Protocol and Vulnerability Mining of Edge Devices Based on Fuzz Testing</title><source>IEEE Xplore All Conference Series</source><creator>Liu, Donglan ; Liu, Xin ; Chang, Yingxian ; Chen, Jianfei ; Zhang, Fangzhe ; Wang, Rui ; Zhang, Hao ; Sun, Lili ; Zhao, Fuhui ; Sun, Mengqian</creator><creatorcontrib>Liu, Donglan ; Liu, Xin ; Chang, Yingxian ; Chen, Jianfei ; Zhang, Fangzhe ; Wang, Rui ; Zhang, Hao ; Sun, Lili ; Zhao, Fuhui ; Sun, Mengqian</creatorcontrib><description>In order to solve the security problems such as the lack of secure key management in the electric Internet of Things protocol, this paper studies the security enhancement technology of electric Internet of Things protocol based on lightweight cryptography technology and new trusted technology. A key exchange scheme based on lightweight cryptography technology is proposed to adapt to the resource-limited scenario of the Internet of Things. To protect keys and data on restricted devices and remote servers, explore lightweight cryptography and new trusted technologies. Performs cryptographic operations without exposing the private key and is resistant to tampering and probing attacks. To realize end-to-end communication and key management between Internet of Things devices and remote servers. At the same time, based on the fuzz testing technology, the unknown vulnerability mining technology of the edge device protocol of the electric Internet of Things is carried out. Firstly, the fuzz testing case intelligent optimization method is studied, and the test case set is reduced based on artificial intelligence algorithms such as genetic algorithm, protocol state machine and stain algorithm, so as to improve the test efficiency. Then, the unknown vulnerability discovery method based on state monitoring is studied, and the test case can be judged whether abnormal occurs by monitoring the state of returned data packets of the tested object, so as to determine whether there are vulnerabilities. Finally, the method of vulnerability intelligent location based on automatic location analysis is studied to accurately locate the test cases that cause vulnerability.</description><identifier>EISSN: 2377-844X</identifier><identifier>EISBN: 9798350331707</identifier><identifier>EISBN: 9798350331721</identifier><identifier>DOI: 10.1109/ICEIEC58029.2023.10199571</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cryptography ; Elliptic curve cryptography ; fuzz testing ; Fuzzing ; Internet of Things ; lightweight cryptography ; new trusted technologies ; Optimization methods ; Performance evaluation ; power Internet of Things protocol ; Protocols ; safety enhancement technology ; vulnerability mining technology</subject><ispartof>2023 IEEE 13th International Conference on Electronics Information and Emergency Communication (ICEIEC), 2023, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10199571$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,27904,54534,54911</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10199571$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Liu, Donglan</creatorcontrib><creatorcontrib>Liu, Xin</creatorcontrib><creatorcontrib>Chang, Yingxian</creatorcontrib><creatorcontrib>Chen, Jianfei</creatorcontrib><creatorcontrib>Zhang, Fangzhe</creatorcontrib><creatorcontrib>Wang, Rui</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Sun, Lili</creatorcontrib><creatorcontrib>Zhao, Fuhui</creatorcontrib><creatorcontrib>Sun, Mengqian</creatorcontrib><title>Security Enhancement Technology for Power Internet of Things Protocol and Vulnerability Mining of Edge Devices Based on Fuzz Testing</title><title>2023 IEEE 13th International Conference on Electronics Information and Emergency Communication (ICEIEC)</title><addtitle>ICEIEC</addtitle><description>In order to solve the security problems such as the lack of secure key management in the electric Internet of Things protocol, this paper studies the security enhancement technology of electric Internet of Things protocol based on lightweight cryptography technology and new trusted technology. A key exchange scheme based on lightweight cryptography technology is proposed to adapt to the resource-limited scenario of the Internet of Things. To protect keys and data on restricted devices and remote servers, explore lightweight cryptography and new trusted technologies. Performs cryptographic operations without exposing the private key and is resistant to tampering and probing attacks. To realize end-to-end communication and key management between Internet of Things devices and remote servers. At the same time, based on the fuzz testing technology, the unknown vulnerability mining technology of the edge device protocol of the electric Internet of Things is carried out. Firstly, the fuzz testing case intelligent optimization method is studied, and the test case set is reduced based on artificial intelligence algorithms such as genetic algorithm, protocol state machine and stain algorithm, so as to improve the test efficiency. Then, the unknown vulnerability discovery method based on state monitoring is studied, and the test case can be judged whether abnormal occurs by monitoring the state of returned data packets of the tested object, so as to determine whether there are vulnerabilities. Finally, the method of vulnerability intelligent location based on automatic location analysis is studied to accurately locate the test cases that cause vulnerability.</description><subject>Cryptography</subject><subject>Elliptic curve cryptography</subject><subject>fuzz testing</subject><subject>Fuzzing</subject><subject>Internet of Things</subject><subject>lightweight cryptography</subject><subject>new trusted technologies</subject><subject>Optimization methods</subject><subject>Performance evaluation</subject><subject>power Internet of Things protocol</subject><subject>Protocols</subject><subject>safety enhancement technology</subject><subject>vulnerability mining technology</subject><issn>2377-844X</issn><isbn>9798350331707</isbn><isbn>9798350331721</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2023</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo1kMFKw0AURUdBsGj_wMX4AanvZZLOzFJjqoGKBYO4K2nmpR1JZ2SSKu3aDzdFXd3N4V7OZewaYYII-qbI8iLPUgWxnsQQiwkCap1KPGFjLbUSKQiBEuQpG8VCykglyds5G3fdOwAI1ACJGrHvF6p3wfZ7nrtN5Wrakut5SfXG-dav97zxgS_8FwVeuJ6Co577hpcb69YdXwTf-9q3vHKGv-5aR6Fa2fZY92TdgBzZ3KyJ39Onranjd1VHhnvHZ7vDYdjp-oG6ZGdN1XY0_ssLVs7yMnuM5s8PRXY7jyyi7iMyADiV8bQxKJHUCgUlEkGZVFVqOghLKTABbIxSSSwHR6yFThohjUhJXLCr31pLRMuPYLdV2C__fxM_HvNjIQ</recordid><startdate>20230714</startdate><enddate>20230714</enddate><creator>Liu, Donglan</creator><creator>Liu, Xin</creator><creator>Chang, Yingxian</creator><creator>Chen, Jianfei</creator><creator>Zhang, Fangzhe</creator><creator>Wang, Rui</creator><creator>Zhang, Hao</creator><creator>Sun, Lili</creator><creator>Zhao, Fuhui</creator><creator>Sun, Mengqian</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20230714</creationdate><title>Security Enhancement Technology for Power Internet of Things Protocol and Vulnerability Mining of Edge Devices Based on Fuzz Testing</title><author>Liu, Donglan ; Liu, Xin ; Chang, Yingxian ; Chen, Jianfei ; Zhang, Fangzhe ; Wang, Rui ; Zhang, Hao ; Sun, Lili ; Zhao, Fuhui ; Sun, Mengqian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i119t-ed0016726fd171e8b13e47108d58a865037731401fd884271901c394f37d35e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cryptography</topic><topic>Elliptic curve cryptography</topic><topic>fuzz testing</topic><topic>Fuzzing</topic><topic>Internet of Things</topic><topic>lightweight cryptography</topic><topic>new trusted technologies</topic><topic>Optimization methods</topic><topic>Performance evaluation</topic><topic>power Internet of Things protocol</topic><topic>Protocols</topic><topic>safety enhancement technology</topic><topic>vulnerability mining technology</topic><toplevel>online_resources</toplevel><creatorcontrib>Liu, Donglan</creatorcontrib><creatorcontrib>Liu, Xin</creatorcontrib><creatorcontrib>Chang, Yingxian</creatorcontrib><creatorcontrib>Chen, Jianfei</creatorcontrib><creatorcontrib>Zhang, Fangzhe</creatorcontrib><creatorcontrib>Wang, Rui</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Sun, Lili</creatorcontrib><creatorcontrib>Zhao, Fuhui</creatorcontrib><creatorcontrib>Sun, Mengqian</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Liu, Donglan</au><au>Liu, Xin</au><au>Chang, Yingxian</au><au>Chen, Jianfei</au><au>Zhang, Fangzhe</au><au>Wang, Rui</au><au>Zhang, Hao</au><au>Sun, Lili</au><au>Zhao, Fuhui</au><au>Sun, Mengqian</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security Enhancement Technology for Power Internet of Things Protocol and Vulnerability Mining of Edge Devices Based on Fuzz Testing</atitle><btitle>2023 IEEE 13th International Conference on Electronics Information and Emergency Communication (ICEIEC)</btitle><stitle>ICEIEC</stitle><date>2023-07-14</date><risdate>2023</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><eissn>2377-844X</eissn><eisbn>9798350331707</eisbn><eisbn>9798350331721</eisbn><abstract>In order to solve the security problems such as the lack of secure key management in the electric Internet of Things protocol, this paper studies the security enhancement technology of electric Internet of Things protocol based on lightweight cryptography technology and new trusted technology. A key exchange scheme based on lightweight cryptography technology is proposed to adapt to the resource-limited scenario of the Internet of Things. To protect keys and data on restricted devices and remote servers, explore lightweight cryptography and new trusted technologies. Performs cryptographic operations without exposing the private key and is resistant to tampering and probing attacks. To realize end-to-end communication and key management between Internet of Things devices and remote servers. At the same time, based on the fuzz testing technology, the unknown vulnerability mining technology of the edge device protocol of the electric Internet of Things is carried out. Firstly, the fuzz testing case intelligent optimization method is studied, and the test case set is reduced based on artificial intelligence algorithms such as genetic algorithm, protocol state machine and stain algorithm, so as to improve the test efficiency. Then, the unknown vulnerability discovery method based on state monitoring is studied, and the test case can be judged whether abnormal occurs by monitoring the state of returned data packets of the tested object, so as to determine whether there are vulnerabilities. Finally, the method of vulnerability intelligent location based on automatic location analysis is studied to accurately locate the test cases that cause vulnerability.</abstract><pub>IEEE</pub><doi>10.1109/ICEIEC58029.2023.10199571</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2377-844X |
ispartof | 2023 IEEE 13th International Conference on Electronics Information and Emergency Communication (ICEIEC), 2023, p.1-6 |
issn | 2377-844X |
language | eng |
recordid | cdi_ieee_primary_10199571 |
source | IEEE Xplore All Conference Series |
subjects | Cryptography Elliptic curve cryptography fuzz testing Fuzzing Internet of Things lightweight cryptography new trusted technologies Optimization methods Performance evaluation power Internet of Things protocol Protocols safety enhancement technology vulnerability mining technology |
title | Security Enhancement Technology for Power Internet of Things Protocol and Vulnerability Mining of Edge Devices Based on Fuzz Testing |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T14%3A02%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20Enhancement%20Technology%20for%20Power%20Internet%20of%20Things%20Protocol%20and%20Vulnerability%20Mining%20of%20Edge%20Devices%20Based%20on%20Fuzz%20Testing&rft.btitle=2023%20IEEE%2013th%20International%20Conference%20on%20Electronics%20Information%20and%20Emergency%20Communication%20(ICEIEC)&rft.au=Liu,%20Donglan&rft.date=2023-07-14&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.eissn=2377-844X&rft_id=info:doi/10.1109/ICEIEC58029.2023.10199571&rft.eisbn=9798350331707&rft.eisbn_list=9798350331721&rft_dat=%3Cieee_CHZPO%3E10199571%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i119t-ed0016726fd171e8b13e47108d58a865037731401fd884271901c394f37d35e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10199571&rfr_iscdi=true |