期刊文献+

需求装载代码协议的安全缺陷分析 被引量:1

Analysis for Security Flaw in Demand Loading Code Protocol
下载PDF
导出
摘要 使用SPI演算对主动网络的需求装载代码协议进行分析,发现其存在被重放攻击的安全漏洞.由于主动网络是计算-存储-转发模型,不同于传统网络的存储-转发模型,所以这种被重放攻击的安全缺陷将对主动节点产生难以预测的后果,并减低其性能和效率.为了消除被重放攻击的危险,修改了原有需求装载代码协议,并增加了其阻止重放攻击的能力. The authors use SPI calculus to analyze the demand loading code protocol of active network. The security flaw of being replay attack in this protocol is found. Model of active network is different from the tradition network. Since the model of active network is compute-storage-forward, and the model of tradition network is storage-forward. The replay attack would make the unexpected result for active network and letdown the performance and efficiency of active node. In order to prevent the replay attack, the authors amend the protocol and enhance the capacity for preventing replay attack.
出处 《软件学报》 EI CSCD 北大核心 2005年第6期1175-1181,共7页 Journal of Software
关键词 主动网络 需求装载代码协议 SPI演算 重放攻击 Active networks Formal logic Network protocols Security of data
  • 相关文献

参考文献3

二级参考文献41

  • 1[1]Tennenhouse, D., Wetherall, D. Towards an active network architecture. In: Proceedings of the Multimedia Computing and Networking 1996. San Jose, CA, 1996.
  • 2[2]O'Malley, S.W., Peterson, L.L. A dynamic network architecture. ACM Transactions on Computer Systems, 1992,10(2):110~143.
  • 3[3]A Security Working Group. 2000. http://www.choices.cs.uiuc.edu/Security/seraphim/May2000/SecurityArchitecture.pdf.
  • 4[4]Lindell, B. Active networks protocol specification for hop-by-hop message authentication and integrity. April 2000. http://www.isi.edu/abone/Documents/Ossec.txt.
  • 5[5]Campbell, R.H. Liu, Zhao-yu. Dynamic interoperable security architecture for active network. IEEE OPENARCH 2000, Israel, March 2000. 32~41.
  • 6[6]Liu, Zhao-yu, Naldurg, P. Agent based architecture for supporting application level security. In: Proceedings of the DARPA Information Survivability Conference and Exposition. Hilton Head Island, 2000. 129~143.
  • 7[7]Liu, Zhao-yu, Campbell, R.H. Securing the node of active networks. In: Hariri, S., Lee, C., eds. Active Middleware Services. Boston, MA: Kluwer Academic Publishers, September 2000.
  • 8[8]Alexander, D.S. Safely and security of programmable network infrastructures. IEEE Communication Magazine, 1998,36(10): 84~92.
  • 9[9]Alexander, D.S. Security in active networks. LNCS 1603, 1999.
  • 10[10]Smith, J.M. Activating networks: a progress report. Computer, 1999,32(4):32~41.

共引文献13

同被引文献10

  • 1Tennenhouse D L,Smith J M,Sincoskie W D,et al.A survey of active network research[J].IEEE Communication Magazine,1997,35 (1):80-86.
  • 2Tennhouse D L,Wetherall D J.Towards an active network architecture[J].Gomputer Gommunication Review,1996,26(2):464-472.
  • 3Josep D 2F.Mobile agent route protection through Hash-based mechanisms[C]//LNCS 2247:Berlin Heidelberg:Springer Verlag,2001:17-29.
  • 4Abadi M,Gordon A D.Reasoning about cryptographic protocols in the spi calculus[C]//Proc of CONCUR' 97.Warsaw,Poland:Springer,1997:59-73.
  • 5Diffie W,Van Oo rschot PC,Wiener M J.Authentication and authenticated key exchanges[J].Designs,Codes and Cryptography,1992,2:107-125.
  • 6Wetherall D J,Guttag J V,Tennenhouse D L.ANTS:a toolkit for building and dynamically deploying network protocols[C]//IEEE Openarch'98.IEEE,1998:117.
  • 7陆月明,钱德沛,徐斌,王磊.Softnet——一个基于移动代理的主动网络[J].计算机学报,2001,24(11):1210-1214. 被引量:7
  • 8徐斌,钱德沛,张文杰,栾钟治.主动网络管理体系结构的研究[J].计算机研究与发展,2002,39(4):488-494. 被引量:16
  • 9王建国,李增智,寇雅楠.基于主动网络技术的在线拍卖[J].西安交通大学学报,2002,36(6):604-607. 被引量:1
  • 10万燕,孙永强.用Spi演算描述并验证非对称双向鉴证协议[J].上海交通大学学报,2002,36(9):1325-1328. 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部