期刊文献+

模型检测中可变攻击者模型的构造 被引量:2

The Construction of Changeable Intruder Model in Model Checking
原文传递
导出
摘要 提出了一个可变攻击者模型构造方案.该方案通过定义抽象项的概念及其运算规则,大大降低了攻击者进行代数运算的复杂度.定义了攻击者行为库和攻击规则选择算法,使检测者能根据不同的协议构造不同的攻击者模型.由于攻击者行为可任意组合,故实现了攻击者模型的可变性.可变攻击者模型保证了模型检测工具对协议分析的效率和准确性. A construction scheme of the changeable intruder model is proposed. By defining the concept of abstract terms and their operation rules. The changeable intruder model (CIM) can greatly reduce the complexity of algebraic operations for intruders. And the CIM defines the intruder action library and the attack rule selection algorithm, which enables the analysts construct a changeable intruder model according to different protocols. As the actions of the intruder are composable, the CIM is able to dynamically adjust the intruder models. Changeable intruder model ensures both efficiency and correctness of the protocol analysis for model checkers.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2011年第2期54-57,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(61072140) 高等学校创新引智计划项目(B08038) 高等学校博士学科点专项科研基金项目(20100203110003)
关键词 安全协议 攻击者模型 代数运算 重写规则 security protocols intruder model algebraic operations rewrite rules
  • 相关文献

参考文献7

  • 1Dolev D, Yao A. On the security of public-key protocols [J]. IEEETrans on Information Theory, 1983, 29(2): 198-208.
  • 2Yohan B, Pierre-Cyrille H, Olga K. Tree automata for detecting attacks on protocols with algebraic cryptographic primitives[ J]. Electronic Notes in Theoretical Computer Science, 2009, 239 ( 1 ) : 57-72.
  • 3Bruno B, Martin A, Cedric F. Automated verification of selected equivalences for security protocols [ J ]. Journal of Logic and Algebraic Programming, 2008, 75 (1): 3-51.
  • 4Veronique C, Stephanie D, Pascal L. A survey of algebraic properties used in cryptographic protocols[ J ]. Journal of Computer Security, 2006, 14( 1 ) : 1-43.
  • 5David B, Sebastian M, Luca V. Algebraic intruder deductions[ C ] // LPAR 2005. Montego Bay: Springer, 2005 : 549-564.
  • 6邱慧敏,杨义先,钮心忻.无线传感器网络中广播通信的安全协议设计[J].北京邮电大学学报,2006,29(5):103-106. 被引量:7
  • 7邓淼磊,马建峰,周利华.RFID匿名认证协议的设计[J].通信学报,2009,30(7):20-26. 被引量:22

二级参考文献10

  • 1屈玉贵,翟羽佳,蔺智挺,赵保华,张英堂.一种新的无线传感器网络传感器放置模型[J].北京邮电大学学报,2004,27(6):1-5. 被引量:24
  • 2柳立峰,邹仕洪,张雷,程时端.基于概率覆盖模型的无线传感器网络密度控制算法[J].北京邮电大学学报,2005,28(4):14-17. 被引量:33
  • 3周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 4Perring A, Szewczyk R, Tygar, et al. SPINS: security protocols for sensor networks [ EB/OL ]. 2001 (2001-03-15) [2005-06-01 ]. http:///ww, ece. crnu. edu/- adrian/projects/mc2001/mc2001, pdf.
  • 5Hoffstein J, Pipher J, Silverman J. NTRU.. a ring-based public key cryptosystem [ C ] //Buhler J. Algorithmic Number Theory. German: Springer Berlin/Heidelberg,1998 : 267-288.
  • 6Priit Caru. Practical comparison of fast public-key cryptosystems [ EB/OL]. 2000 (2000-07-02) [ 2005-06-03 ].http:///www, tml. hut. fi/Opinnot/Tik-110,501/2000/paper/loikkanen- kahc. pdf.
  • 7Colleen Marie O' Rourke. Efficient NTRU implementation[D]. USA: Worcester Polytechnic, 2002.
  • 8David H, Bo-Cheng C, Ingrid V. Energy-memory-security tradeoffs in distributed senor networks[C] ffProc International Conference on Ad-hoc Networks and Wireless( ADHOC-Now 2004). German: Springer Berlin/Heidelberg, 2004.. 70-81.
  • 9Sencun Z, Sanjeev S, Sushi J, Leap: efficient security mechanisms for large-scale distributed sensor network[EB/OL]. 2003 (2003-07-01) [2005-06-01 ]. http: ///www. cse. psu. edu/szhu/papers/leap, pdf.
  • 10张帆,孙璇,马建峰,曹春杰,朱建明.供应链环境下通用可组合安全的RFID通信协议[J].计算机学报,2008,31(10):1754-1767. 被引量:30

共引文献27

同被引文献16

  • 1肖美华,薛锦云.时态逻辑形式化描述并发系统性质[J].海军工程大学学报,2004,16(5):10-13. 被引量:12
  • 2Mitchell, J. C. , Mitchell, M. , Stern, U. Automated analysis of cryptographic protocols using murphi[C]// Proceedings of the 1997 Conference on Security and Privacy (S&P-97), Los Alamitos, IEEE Press, 1997: 141-153.
  • 3Jamal Bentahar, Mohamed E1-Menshawy, Hongyang Qu, et al. Communicative commitments: Model chec- king and complexity analysis[J]. Knowledge-based sys- tems, 2012,35 : 21-34.
  • 4Paolo Maggi, R. Sisto. Using SPIN to Verify Security Properties of Cryptographic Protocols[C]//Proc. of the 9th International SPIN Workshop on Model Chec- king of Software. LNCS 2318, Grenoble, France, 2002: 187-204.
  • 5Jefferson O. Andrade, Yukiyoshi Kameyama. Efficient Multi-Valued Bounded Model Checking for LTL over Quasi-Boolean Algehras[J]. IEICE transactions on in- formation and systems, 2012 : E95-D(5).
  • 6T. Y. C. Woo, S. S. Lam. Authentication Revisited [J]. Computer(IEEE), 1992,25 (3).
  • 7Colin Boyd, Anish Mathuria. Protocols for authenti cation and key establishment[J]. Springer, 2003: 78- 99.
  • 8李建华,张爱新,薛质,等.网络安全协议的形式化分析与验证[M].北京:乔宇,2010:7-8.
  • 9D. Dolev and A. Yao. On the security of public key protocols[J]. IEEE Transactions on Information The- ory,29(2) :198-208, March 1983.
  • 10吴昌,肖美华,罗敏,刘俏威,熊昊.安全协议验证模型的高效自动生成[J].计算机工程与应用,2010,46(2):79-82. 被引量:4

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部