期刊文献+

基于SPIN的网络认证协议高效模型检测 被引量:4

Effective model checking of network authentication protocol based on SPIN
下载PDF
导出
摘要 为了有效地提高网络认证协议建模和验证的效率,基于模型检测方法提出一个通用的网络认证协议模型描述方法,结合模型检测工具SPIN可以方便地进行性质验证。通过一些模型的简化策略,不仅可以对不同协议进行高效建模,而且减小了模型的状态空间。与现有的文献相比,自动化程度较高,模型验证的效率较好。基于该方法,对PKM认证协议进行了模型检测,实验证明该模型分析验证方法的有效性,可用于其他网络认证协议的分析验证。 In order to improve the efficiency of modeling and verification on network authentication protocols with the model checking,this paper proposes a universal formalization description method of the network authentication protocol.Combined with model checking tool SPIN,the method can expediently verify the properties of the protocol.By some modeling simplified strategies,several protocols can be modeled efficiently,and the state space of the model is reduced.Compared with the previous literature,this paper achieves higher degree of automation,and better efficiency of model verification.Based on the method described in this paper,the PKM authentication protocol is modeled and verified.The experimental results show that the method of model checking is effective,which is useful for the other authentication protocols.
出处 《计算机工程与应用》 CSCD 2012年第21期62-67,共6页 Computer Engineering and Applications
基金 中央高校基本科研业务费资助
关键词 网络认证协议 模型检测 简单进程元语言解释器(SPIN) 模型简化策略 密钥管理(PKM)协议 network authentication protocol model checking Simple Promela Interprete(rSPIN) modeling simplified strategies Privacy and Key Managemen(tPKM)protocol
  • 相关文献

参考文献11

  • 1Burrows M, Abadi M,Needham R.A logic of authentica- tion[R].Degital Equipment Corporation, 1989.
  • 2Lowe G.Breaking and fixing the Needham-Schroeder pub- lic-key authentication protocol using CSP and FDR[C]// LNCS 1055 : Proceedings of TACAS.[S.1.] : Springer-Verlag, 1996.
  • 3I Clarke E M,Grumberg O,Peled D.Model checking[M]. [S.1.] :MIT Press, 1999.
  • 4Meadows C.Analysis of the Internet key exchange proto-col using the NRL protocol analyzer[C]//Proceedings of IEEE Symposium on Security and Privacy.[S.1.]:IEEE Computer Society Press, 1999: 216-231.
  • 5Meadows C.Analyzing the Needham-Schroeder public key protocol: a comparison of two approaches[C]//Bertion E. LNCS l146:Proceedings of Computer Security,ESORICS'96. [S.1.] : Springer-Verlag, 1996.
  • 6Holzmann G J.The spin model checker:primer and ref- erence manual[M].[S.1.] :Addison-Wesley,2004.
  • 7Maggi P, Sisto R.Using SPIN to verify security proper- ties of cryptographic protocols[C]//SPIN' 2002 Workshop, 2002.
  • 8Khan A S, Mukund M, Suresh S RGeneric verification of security protocols[C]//SP1N 2005,2005:221-235.
  • 9Dolev D, Yao A.On the securiEz of public key protocols[J]. IEEE Trans on Information Theory, 1983,29(2) : 198-208.
  • 10Ramanujam R, Suresh S P. Decidability of context-ex- plicit security protocols[J].Jottrnal of Computer Security, 2005,13(1):135-165.

同被引文献38

引证文献4

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部