Loading…

Security Enhancement Technology for Power Internet of Things Protocol and Vulnerability Mining of Edge Devices Based on Fuzz Testing

In order to solve the security problems such as the lack of secure key management in the electric Internet of Things protocol, this paper studies the security enhancement technology of electric Internet of Things protocol based on lightweight cryptography technology and new trusted technology. A key...

Full description

Saved in:
Bibliographic Details
Main Authors: Liu, Donglan, Liu, Xin, Chang, Yingxian, Chen, Jianfei, Zhang, Fangzhe, Wang, Rui, Zhang, Hao, Sun, Lili, Zhao, Fuhui, Sun, Mengqian
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Liu, Donglan
Liu, Xin
Chang, Yingxian
Chen, Jianfei
Zhang, Fangzhe
Wang, Rui
Zhang, Hao
Sun, Lili
Zhao, Fuhui
Sun, Mengqian
description In order to solve the security problems such as the lack of secure key management in the electric Internet of Things protocol, this paper studies the security enhancement technology of electric Internet of Things protocol based on lightweight cryptography technology and new trusted technology. A key exchange scheme based on lightweight cryptography technology is proposed to adapt to the resource-limited scenario of the Internet of Things. To protect keys and data on restricted devices and remote servers, explore lightweight cryptography and new trusted technologies. Performs cryptographic operations without exposing the private key and is resistant to tampering and probing attacks. To realize end-to-end communication and key management between Internet of Things devices and remote servers. At the same time, based on the fuzz testing technology, the unknown vulnerability mining technology of the edge device protocol of the electric Internet of Things is carried out. Firstly, the fuzz testing case intelligent optimization method is studied, and the test case set is reduced based on artificial intelligence algorithms such as genetic algorithm, protocol state machine and stain algorithm, so as to improve the test efficiency. Then, the unknown vulnerability discovery method based on state monitoring is studied, and the test case can be judged whether abnormal occurs by monitoring the state of returned data packets of the tested object, so as to determine whether there are vulnerabilities. Finally, the method of vulnerability intelligent location based on automatic location analysis is studied to accurately locate the test cases that cause vulnerability.
doi_str_mv 10.1109/ICEIEC58029.2023.10199571
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_10199571</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10199571</ieee_id><sourcerecordid>10199571</sourcerecordid><originalsourceid>FETCH-LOGICAL-i119t-ed0016726fd171e8b13e47108d58a865037731401fd884271901c394f37d35e3</originalsourceid><addsrcrecordid>eNo1kMFKw0AURUdBsGj_wMX4AanvZZLOzFJjqoGKBYO4K2nmpR1JZ2SSKu3aDzdFXd3N4V7OZewaYYII-qbI8iLPUgWxnsQQiwkCap1KPGFjLbUSKQiBEuQpG8VCykglyds5G3fdOwAI1ACJGrHvF6p3wfZ7nrtN5Wrakut5SfXG-dav97zxgS_8FwVeuJ6Co577hpcb69YdXwTf-9q3vHKGv-5aR6Fa2fZY92TdgBzZ3KyJ39Onranjd1VHhnvHZ7vDYdjp-oG6ZGdN1XY0_ssLVs7yMnuM5s8PRXY7jyyi7iMyADiV8bQxKJHUCgUlEkGZVFVqOghLKTABbIxSSSwHR6yFThohjUhJXLCr31pLRMuPYLdV2C__fxM_HvNjIQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security Enhancement Technology for Power Internet of Things Protocol and Vulnerability Mining of Edge Devices Based on Fuzz Testing</title><source>IEEE Xplore All Conference Series</source><creator>Liu, Donglan ; Liu, Xin ; Chang, Yingxian ; Chen, Jianfei ; Zhang, Fangzhe ; Wang, Rui ; Zhang, Hao ; Sun, Lili ; Zhao, Fuhui ; Sun, Mengqian</creator><creatorcontrib>Liu, Donglan ; Liu, Xin ; Chang, Yingxian ; Chen, Jianfei ; Zhang, Fangzhe ; Wang, Rui ; Zhang, Hao ; Sun, Lili ; Zhao, Fuhui ; Sun, Mengqian</creatorcontrib><description>In order to solve the security problems such as the lack of secure key management in the electric Internet of Things protocol, this paper studies the security enhancement technology of electric Internet of Things protocol based on lightweight cryptography technology and new trusted technology. A key exchange scheme based on lightweight cryptography technology is proposed to adapt to the resource-limited scenario of the Internet of Things. To protect keys and data on restricted devices and remote servers, explore lightweight cryptography and new trusted technologies. Performs cryptographic operations without exposing the private key and is resistant to tampering and probing attacks. To realize end-to-end communication and key management between Internet of Things devices and remote servers. At the same time, based on the fuzz testing technology, the unknown vulnerability mining technology of the edge device protocol of the electric Internet of Things is carried out. Firstly, the fuzz testing case intelligent optimization method is studied, and the test case set is reduced based on artificial intelligence algorithms such as genetic algorithm, protocol state machine and stain algorithm, so as to improve the test efficiency. Then, the unknown vulnerability discovery method based on state monitoring is studied, and the test case can be judged whether abnormal occurs by monitoring the state of returned data packets of the tested object, so as to determine whether there are vulnerabilities. Finally, the method of vulnerability intelligent location based on automatic location analysis is studied to accurately locate the test cases that cause vulnerability.</description><identifier>EISSN: 2377-844X</identifier><identifier>EISBN: 9798350331707</identifier><identifier>EISBN: 9798350331721</identifier><identifier>DOI: 10.1109/ICEIEC58029.2023.10199571</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cryptography ; Elliptic curve cryptography ; fuzz testing ; Fuzzing ; Internet of Things ; lightweight cryptography ; new trusted technologies ; Optimization methods ; Performance evaluation ; power Internet of Things protocol ; Protocols ; safety enhancement technology ; vulnerability mining technology</subject><ispartof>2023 IEEE 13th International Conference on Electronics Information and Emergency Communication (ICEIEC), 2023, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10199571$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,27904,54534,54911</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10199571$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Liu, Donglan</creatorcontrib><creatorcontrib>Liu, Xin</creatorcontrib><creatorcontrib>Chang, Yingxian</creatorcontrib><creatorcontrib>Chen, Jianfei</creatorcontrib><creatorcontrib>Zhang, Fangzhe</creatorcontrib><creatorcontrib>Wang, Rui</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Sun, Lili</creatorcontrib><creatorcontrib>Zhao, Fuhui</creatorcontrib><creatorcontrib>Sun, Mengqian</creatorcontrib><title>Security Enhancement Technology for Power Internet of Things Protocol and Vulnerability Mining of Edge Devices Based on Fuzz Testing</title><title>2023 IEEE 13th International Conference on Electronics Information and Emergency Communication (ICEIEC)</title><addtitle>ICEIEC</addtitle><description>In order to solve the security problems such as the lack of secure key management in the electric Internet of Things protocol, this paper studies the security enhancement technology of electric Internet of Things protocol based on lightweight cryptography technology and new trusted technology. A key exchange scheme based on lightweight cryptography technology is proposed to adapt to the resource-limited scenario of the Internet of Things. To protect keys and data on restricted devices and remote servers, explore lightweight cryptography and new trusted technologies. Performs cryptographic operations without exposing the private key and is resistant to tampering and probing attacks. To realize end-to-end communication and key management between Internet of Things devices and remote servers. At the same time, based on the fuzz testing technology, the unknown vulnerability mining technology of the edge device protocol of the electric Internet of Things is carried out. Firstly, the fuzz testing case intelligent optimization method is studied, and the test case set is reduced based on artificial intelligence algorithms such as genetic algorithm, protocol state machine and stain algorithm, so as to improve the test efficiency. Then, the unknown vulnerability discovery method based on state monitoring is studied, and the test case can be judged whether abnormal occurs by monitoring the state of returned data packets of the tested object, so as to determine whether there are vulnerabilities. Finally, the method of vulnerability intelligent location based on automatic location analysis is studied to accurately locate the test cases that cause vulnerability.</description><subject>Cryptography</subject><subject>Elliptic curve cryptography</subject><subject>fuzz testing</subject><subject>Fuzzing</subject><subject>Internet of Things</subject><subject>lightweight cryptography</subject><subject>new trusted technologies</subject><subject>Optimization methods</subject><subject>Performance evaluation</subject><subject>power Internet of Things protocol</subject><subject>Protocols</subject><subject>safety enhancement technology</subject><subject>vulnerability mining technology</subject><issn>2377-844X</issn><isbn>9798350331707</isbn><isbn>9798350331721</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2023</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo1kMFKw0AURUdBsGj_wMX4AanvZZLOzFJjqoGKBYO4K2nmpR1JZ2SSKu3aDzdFXd3N4V7OZewaYYII-qbI8iLPUgWxnsQQiwkCap1KPGFjLbUSKQiBEuQpG8VCykglyds5G3fdOwAI1ACJGrHvF6p3wfZ7nrtN5Wrakut5SfXG-dav97zxgS_8FwVeuJ6Co577hpcb69YdXwTf-9q3vHKGv-5aR6Fa2fZY92TdgBzZ3KyJ39Onranjd1VHhnvHZ7vDYdjp-oG6ZGdN1XY0_ssLVs7yMnuM5s8PRXY7jyyi7iMyADiV8bQxKJHUCgUlEkGZVFVqOghLKTABbIxSSSwHR6yFThohjUhJXLCr31pLRMuPYLdV2C__fxM_HvNjIQ</recordid><startdate>20230714</startdate><enddate>20230714</enddate><creator>Liu, Donglan</creator><creator>Liu, Xin</creator><creator>Chang, Yingxian</creator><creator>Chen, Jianfei</creator><creator>Zhang, Fangzhe</creator><creator>Wang, Rui</creator><creator>Zhang, Hao</creator><creator>Sun, Lili</creator><creator>Zhao, Fuhui</creator><creator>Sun, Mengqian</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20230714</creationdate><title>Security Enhancement Technology for Power Internet of Things Protocol and Vulnerability Mining of Edge Devices Based on Fuzz Testing</title><author>Liu, Donglan ; Liu, Xin ; Chang, Yingxian ; Chen, Jianfei ; Zhang, Fangzhe ; Wang, Rui ; Zhang, Hao ; Sun, Lili ; Zhao, Fuhui ; Sun, Mengqian</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i119t-ed0016726fd171e8b13e47108d58a865037731401fd884271901c394f37d35e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cryptography</topic><topic>Elliptic curve cryptography</topic><topic>fuzz testing</topic><topic>Fuzzing</topic><topic>Internet of Things</topic><topic>lightweight cryptography</topic><topic>new trusted technologies</topic><topic>Optimization methods</topic><topic>Performance evaluation</topic><topic>power Internet of Things protocol</topic><topic>Protocols</topic><topic>safety enhancement technology</topic><topic>vulnerability mining technology</topic><toplevel>online_resources</toplevel><creatorcontrib>Liu, Donglan</creatorcontrib><creatorcontrib>Liu, Xin</creatorcontrib><creatorcontrib>Chang, Yingxian</creatorcontrib><creatorcontrib>Chen, Jianfei</creatorcontrib><creatorcontrib>Zhang, Fangzhe</creatorcontrib><creatorcontrib>Wang, Rui</creatorcontrib><creatorcontrib>Zhang, Hao</creatorcontrib><creatorcontrib>Sun, Lili</creatorcontrib><creatorcontrib>Zhao, Fuhui</creatorcontrib><creatorcontrib>Sun, Mengqian</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Liu, Donglan</au><au>Liu, Xin</au><au>Chang, Yingxian</au><au>Chen, Jianfei</au><au>Zhang, Fangzhe</au><au>Wang, Rui</au><au>Zhang, Hao</au><au>Sun, Lili</au><au>Zhao, Fuhui</au><au>Sun, Mengqian</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security Enhancement Technology for Power Internet of Things Protocol and Vulnerability Mining of Edge Devices Based on Fuzz Testing</atitle><btitle>2023 IEEE 13th International Conference on Electronics Information and Emergency Communication (ICEIEC)</btitle><stitle>ICEIEC</stitle><date>2023-07-14</date><risdate>2023</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><eissn>2377-844X</eissn><eisbn>9798350331707</eisbn><eisbn>9798350331721</eisbn><abstract>In order to solve the security problems such as the lack of secure key management in the electric Internet of Things protocol, this paper studies the security enhancement technology of electric Internet of Things protocol based on lightweight cryptography technology and new trusted technology. A key exchange scheme based on lightweight cryptography technology is proposed to adapt to the resource-limited scenario of the Internet of Things. To protect keys and data on restricted devices and remote servers, explore lightweight cryptography and new trusted technologies. Performs cryptographic operations without exposing the private key and is resistant to tampering and probing attacks. To realize end-to-end communication and key management between Internet of Things devices and remote servers. At the same time, based on the fuzz testing technology, the unknown vulnerability mining technology of the edge device protocol of the electric Internet of Things is carried out. Firstly, the fuzz testing case intelligent optimization method is studied, and the test case set is reduced based on artificial intelligence algorithms such as genetic algorithm, protocol state machine and stain algorithm, so as to improve the test efficiency. Then, the unknown vulnerability discovery method based on state monitoring is studied, and the test case can be judged whether abnormal occurs by monitoring the state of returned data packets of the tested object, so as to determine whether there are vulnerabilities. Finally, the method of vulnerability intelligent location based on automatic location analysis is studied to accurately locate the test cases that cause vulnerability.</abstract><pub>IEEE</pub><doi>10.1109/ICEIEC58029.2023.10199571</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2377-844X
ispartof 2023 IEEE 13th International Conference on Electronics Information and Emergency Communication (ICEIEC), 2023, p.1-6
issn 2377-844X
language eng
recordid cdi_ieee_primary_10199571
source IEEE Xplore All Conference Series
subjects Cryptography
Elliptic curve cryptography
fuzz testing
Fuzzing
Internet of Things
lightweight cryptography
new trusted technologies
Optimization methods
Performance evaluation
power Internet of Things protocol
Protocols
safety enhancement technology
vulnerability mining technology
title Security Enhancement Technology for Power Internet of Things Protocol and Vulnerability Mining of Edge Devices Based on Fuzz Testing
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T14%3A02%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20Enhancement%20Technology%20for%20Power%20Internet%20of%20Things%20Protocol%20and%20Vulnerability%20Mining%20of%20Edge%20Devices%20Based%20on%20Fuzz%20Testing&rft.btitle=2023%20IEEE%2013th%20International%20Conference%20on%20Electronics%20Information%20and%20Emergency%20Communication%20(ICEIEC)&rft.au=Liu,%20Donglan&rft.date=2023-07-14&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.eissn=2377-844X&rft_id=info:doi/10.1109/ICEIEC58029.2023.10199571&rft.eisbn=9798350331707&rft.eisbn_list=9798350331721&rft_dat=%3Cieee_CHZPO%3E10199571%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i119t-ed0016726fd171e8b13e47108d58a865037731401fd884271901c394f37d35e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10199571&rfr_iscdi=true