期刊文献+

Kaman协议的形式化验证

Formal Verification of Kaman Protocol
下载PDF
导出
摘要 Kaman协议是移动Ad Hoc网络安全认证机制,然而,协议设计者未对该协议的安全性作严格的形式化分析。协议复合逻辑PCL是验证协议安全属性的形式化方法,PCL逻辑能够简化协议安全分析过程。本文在协议复合逻辑PCL中描述Kaman协议并分析Kaman协议的安全属性,证明Kaman协议能够实现其安全目标。 Kaman is security authentication scheme of mobile Ad Hoc networks.However,the author of Kaman didn't verify security of the protocol by using formal method.Protocol Composition Logic(PCL) is formal verification logic of security protocol.This logic can simplify the process of protocol verification.This paper describes Kaman and analyzes its security properties in PCL.It is proved that Kaman can implement its security aim.
作者 文双举
出处 《计算机与现代化》 2012年第4期17-22,47,共7页 Computer and Modernization
关键词 移动ADHOC网络 协议复合逻辑 Kaman协议 Ad Hoc networks protocol composition logic Kaman protocol
  • 相关文献

参考文献14

  • 1Acs G,Buttyan L,Vajda I.Provably secure on-demandsource routing in mobile Ad Hoc networks[J].IEEE Trans.on Mobile Computing,2006,5(11):1533-1546.
  • 2Levente Buttyán,István Vajda.Towards provable securityfor ad hoc routing protocols[C]//Proceedings of the ACMWorkshop on Security in Ad Hoc and Sensor Networks,ESAS’04.ACM Press,2004:94-105.
  • 3李沁,曾庆凯.利用类型推理验证Ad Hoc安全路由协议[J].软件学报,2009,20(10):2822-2833. 被引量:7
  • 4刘晶,伏飞,肖军模.一种安全DSR协议的形式化分析方法[J].解放军理工大学学报(自然科学版),2009,10(5):423-429. 被引量:2
  • 5Jens Chr Godskesen,Sebastian Nanz.Mobility models andbehavioural equivalence for wireless networks[C]//Proc.the 11th International Conference on Coordination Modelsand Languages.Springer,2009,552:106-122.
  • 6Todd R Andel.Formal security evaluation of Ad Hoc routingprotocols[D].College Of Arts and Sciences,Florid State U-niversity,2007.
  • 7Datta,A,Derek A,Mitchell J C,et al.A derivation sys-tem and compositional logic for security protocols[J].Jour-nal of Computer Security,2005,13(3):423-482.
  • 8He C,Sundararajan M,Datta A,et al.A modular correct-ness proof of IEEE 802.11i and TLS[C]//Proceedings ofthe 12th ACM Conference on Computer and Communica-tions Security.2005:2-15.
  • 9Arnab Roy,Anupam Datta,Ante Derek,et al.Secrecyanalysis in protocol composition logic[C]//Proceedings ofthe 11th Asian Computing Science Conference on Ad-vances in Computer Science:Secure Software and RelatedIssues.2006:197-213.
  • 10铁满霞,李建东,王育民.WAPI密钥管理协议的PCL证明[J].电子与信息学报,2009,31(2):444-447. 被引量:7

二级参考文献46

  • 1常亚勤,王滨,张少武.一个无线认证协议的分析与改进[J].郑州大学学报(理学版),2006,38(2):40-42. 被引量:1
  • 2Mao W B.现代密码学的理论与实践[M].王继林,译.北京:电子工业出版社,2004:389-390.
  • 3Datta A, Derek A, Mitchell J C,et al. Protocol Composition Logic (PCL)[J]. Electronic Notes in Theoretical Computer Science(ENTCS), 2007, 172 : 311-358.
  • 4Roy A, Datta A, Derek A, et al. Secrecy analysis in Protocol Composition Logic[C]//The llth Annual Asian Computing Science Conference (ASIAN'06). Tokyo, 2006.
  • 5Burrows M, Abadi M, Needham R. A logic of authentication[J]. ACM Transactionson Computer Systems, 1990,8(1) : 18-36.
  • 6Paulson L C. Proving properties of security protocols by induction[C]// Proceedings of the 10th IEEE Computer Society Symposium on Research in Security and Privacy. USA: Rockport, MA, 1997: 70-83.
  • 7黄振海,郭宏,王育民等.GB15629.11-2003《信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范》.北京,中国标准出版社,2003.
  • 8赖晓龙,曹军,铁满霞等.GB15629.11-2003/XG1-2006《信息技术系统间远程通信和信息交换局域网和城域网特定要求第11部分:无线局域网媒体访问控制和物理层规范第1号修改单》,北京:中国标准出版社,2006年.
  • 9Cremers C. On the Protocol Composition Logic PCL. http: //arxiv.org/abs/0709.1080v4, 2007.
  • 10Mitchell J C, Shmatikov V, and Stern U. Finite-state analysis of ssl 3.0. Proceedings of the Seventh USENIX Security Symposium, San Antonio, 1998: 201-216.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部