期刊文献+

基于状态模型的四次握手协议验证 被引量:1

Verification of 4-Way Handshake Protocol Based on State Model
下载PDF
导出
摘要 利用外部和内部事件状态模型方法抽象出四次握手协议的逻辑过程,并建立协议中重要性质的形式化模型(例如:消息发送顺序、分配密钥等)。Spin工具的特性是对状态模型和性质进行模型检测,通过对模型进一步检测和验证结果的分析,得出四次握手协议在密钥GTK分配上具有一定缺陷,并会导致GTK传送失败。 By carefully studying the interior and exterior state of the model, aims to abstract and analyze the complicated logical process of the 4-way handshake system and summarize some important characters such as sequence of message sending, key assigning so on so forth. Tests the state and quality of the model with the help of the characters of Spin and analyzes the results. Finally it is found that some bugs in the process of assigning GTK would result in failed sending.
作者 金秀
出处 《现代计算机》 2009年第5期21-24,50,共5页 Modern Computer
基金 安徽省高校省级自然科学基金(No.kj2007b158)
关键词 四次握手 安全 模型检测 状态模型 形式化验证 4-Way Handshake Security Model Checking State Model Formalized Verification
  • 相关文献

参考文献9

  • 1IEEE Std 802.11. Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specifications[S].LAN/MAN Standards Committee of the IEEE Computer Society,1999
  • 2IEEE Std 802.11i-2004. IEEE Standard for Information Technology Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks- Specific Requirements-Part 1 t:Wireless LAN Medium Ac- cess Control (MAC) and Physical Layer (PHY) Specifications-Amendment 6:Medium Access Control (MAC) Security Enhancements[S].LAN/MAN Standards Committee of the IEEE Computer Society,2004
  • 3D. Obradovic. Formal Analysis of Routing Protocols[D]. University of Penns1ylvania, 2002
  • 4E. M. Clarke, O. Grumberg, and D. Peled. Model Checking [M]. MIT Press, 1999
  • 5IEEE Std 802.1X-2004.IEEE Standard for Local and Metropolitan Area Networks-Port-Based Network Access Control[S]. LAN/MAN Standards Committee of the IEEE Computer Society, 2004
  • 6Erten,Y.M. A Layered Security Architecture for Corporate 802.11 Wireless Networks[R]. Pomona, California: Wireless Telecommunications Symposium, 2004
  • 7C. Meadows. Formal Methods for Cryptographic Protocol Analysis: Emerging Issues and Trends[M], IEEE Journal on Selected Areas in Communications, vol. 21, pp. 44-54, January 2003
  • 8A. Perrig, and D. Song. An Initial Approach to Automatic Generation of Security Protocols[C]. In Proceedings of NDSS'00 (Network and Distributed System Security Symposium), San Diego, CA, USA, 2000
  • 9D. Song, S. Berezin, and A. Perrig. Athena: a Novel Approach to Efficient Automatic Security Protocol Analysis [M], Journal of Computer Security, vol. 9, pp. 47-74, 2001

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部