期刊文献+

基于SPIN的IKEv2协议高效模型检测 被引量:5

Effective model checking of IKEv2 protocol based on SPIN
下载PDF
导出
摘要 论文先简单介绍了互联网密钥交换协议IKEv2,然后利用著名的模型检测工具SPIN对其进行了建模和分析。在建模的过程中,作者发现现有的建模方法很难对结构复杂的协议IKEv2进行建模,而且用现有的建模方法建立的模型可读性差、自动化程度不高,验证效率也比较低,因此现有的建模方法只适用于对简单协议进行建模。针对这些不足之处,提出了一种程序可读性、自动化程度及验证效率均较好的建模方法,而且这种建模方法特别适合对复杂的安全协议进行建模。最后利用SPIN对IKEv2协议的模型进行了验证,发现IKEv2协议不能抵御主动攻击,并给出了两个攻击序列图。针对IKEv2协议不能保护发起者身份的缺陷,提出了自己的一种改进意见。 This paper first gives a simple introduction of the Internet Key Exchange Protocol IKEv2,then conducts a modeling and analysis of the protocol by using the famous model checking tool SPIN.The author finds the existing modeling method hardly applicable because of the highly complex structure of IKEv2 protocol,and that it can only be used for some simple protocols due to its poor readability,low automatization and verification efficiency.Thus the paper proposes another method of modeling which overcomes all the above mentioned disadvantages and which is particularly useful for complicated protocols.At last,the verification of the IKEv2 protocol model based on SPIN shows that this protocol is incapable of resisting initiative attack.Based on this discovery,two charts are given describing the attack and a personal view is presented to improve IKEv2 protocol's ability to protect the identity of initiator.
作者 吴昌 肖美华
出处 《计算机工程与应用》 CSCD 北大核心 2008年第5期158-161,共4页 Computer Engineering and Applications
基金 江西省自然科学基金(the Natural Science Foundation of Jiangxi Province of China under Grant No.0411041 No.0611057)
关键词 IKEV2 模型检测 SPIN PROMELA IP隧道 IKEv2 model checking SPIN Promela IP Tunnel
  • 相关文献

参考文献10

二级参考文献43

  • 1[1]Clarke E M, Grumberg O, Peled D A. Model checking, Cambridge,MA: MIT Press, 1999
  • 2[3]Holzmann G J. The SPIN Model Checker,Primer and Reference Manual. Addison-Wesley, 2003
  • 3[4]Berard B,Bidoit M,Finkel A. System and Software Verification:Model Checking Techniques and Tools. Springer-Verlag,2001
  • 4[5]http://netlib. bell-labs. com/netlib/spin
  • 5[6]SPIN Online Documentation, Concise Promela, Reference, RobGerth,Eindhoven University,Accessible from[5]
  • 6[7]Ruys T C. SPIN Tutorial: How to Become a SPIN Doctor,LNCS2318,2002
  • 7[8]http://www. acm. org/awards/ssaward. html
  • 8Lowe G.Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR[C].In :Proceedings of TACAS,Springer_Verlag, 1996: 147-166.
  • 9Burrows M,Abadi M,Needham R.A Logic of Authentication[J].ACM Transactions on Computer Systems, 1990;8( 1 ) : 18-36.
  • 10Mitchell J,Mitchell M,Stern U.Automated analysis of cryptographic protocols using Murp[C].In:Proceedings if the IEEE Symposium on Security and Privacy. 1997 : 141-51.

共引文献45

同被引文献52

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部