期刊文献+

无线认证协议的模型检验分析研究

On the Model Checking of Wireless Authentication Protocols
下载PDF
导出
摘要 模型检验作为一种有效的分析和验证手段,在对有线认证协议的形式化分析上已得到了成功的应用,但关于无线认证协议的相关工作目前还比较少。论文应用模型检验方法对D.S.Wong等提出的无线认证协议(Server-specificMAKEP)的安全性进行分析,在分析过程中充分考察了无线环境中移动装置和无线网络的特点,验证结果表明了该方法用于分析无线认证协议的有效性。 As an effective formal analysis and verification method,model checking has been successfully applied to wired authentication protocols.However,there exists much work to do in wireless authentication protocols.In this paper, the security of the wireless authentication protocol(Server-specific MAKEP) is analyzed using model checking.Where the features of mobile device and wireless network in wireless environment are considered.The result shows that our technique is an effective way to analyze wireless authentication protocols.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第21期118-120,共3页 Computer Engineering and Applications
基金 广西十百千人才专项基金项目 广西科学基金资助
关键词 无线认证协议 安全性 模型检验 wireless authentication protocols,security,model checking
  • 相关文献

参考文献10

  • 1Gupta V,Gupta S.Securing the wireless internet[J].IEEE Communications Magazine,2001 ;39(12):68~75
  • 2Whe Dar Lin,Jinn-Ke Jan.A wireless based authentication and anonymous channels for large scale area[C].In:the 6th IEEE Symposium on Computers Communications,Hammamet,2001:36~41
  • 3Wong Duncan S,Chan Agnes H.Mutual authentication and key exchange for low power wireless communications[C].In:Proceeding of Military Communications for Network-Centric Operations Conference,McLean,2001:39~43
  • 4N Agray,W van der Hoek,E de Vink.On BAN logics for industrial security Protocols[C].In:From Theory to Practice in Multi-Agent Systems,LNAI 2296,2001:29~38
  • 5Kim I1-Gon,Choi Jin-Young.Formal verification of PAP and EAPMD5 protocols in wireless networks:FDR model checking[C].In:Proceedings of the 18th International Conference on Advanced Information Networking and Applications,Fukuoka,2004:29~31
  • 6张广胜.基于时延Petri网的密码协议分析及性能评估[J].计算机工程与应用,2003,39(30):158-161. 被引量:1
  • 7Shim Kyungah.Cryptanalysis of mutual authentication and key exchange for low power wireless communications[J].IEEE Communications Letters,2003 ;7(5):248~250
  • 8Ng Siaw-Lynn,Mitchell Chris.Comments on mutual authentication and key exchange protocols for low power wireless communications[J].IEEE Communications Letters,2004;8(4):262~263
  • 9张玉清,王磊,肖国镇,吴建平.Needham-Schroeder公钥协议的模型检测分析[J].软件学报,2000,11(10):1348-1352. 被引量:29
  • 10McMillan KL.Symbolic model checking[D].PhD thesis.University of Carnegie Mellon,Pittsburgh,USA,1992

二级参考文献4

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部