期刊文献+

SIP协议的SPIN模型检测 被引量:3

Model checking of SIP protocol via SPIN
下载PDF
导出
摘要 2010年Yoon等人提出一种基于椭圆曲线的三要素SIP认证密钥协商协议TAKASIP,但其存在一些攻击。对唐宏斌等人提出的该协议的改进方案使用SPIN进行了分析,发现仍然存在安全漏洞。针对这些缺陷,提出了一种有效的改进方案,采用在协议的消息中加入只有双方共享的秘密值的方法,克服了安全漏洞。新方案在不降低效率的情况下,提高了安全性。 In 2010, Yoon et al. proposed a three-factor authenticated key agreement scheme for SIP on Elliptic Curves named TAKASIP, but it exists some attacks. Using SPIN to analysis that the version given by Tang et al still exists an attack. Based on these flaws, an effective improvement for TAKASIP protocol is given, which adds a secret value only shared by both sides in the protocol and overcomes the security drawbacks. New scheme not only improves security but also maintains the high efficiency.
出处 《计算机工程与应用》 CSCD 2014年第13期87-89,113,共4页 Computer Engineering and Applications
基金 国家自然科学基金(No.61202463)
关键词 TAKASIP协议 椭圆曲线 SPIN工具 模型检测 TAKASIP protocol Elliptic curve SPIN model checking
  • 相关文献

参考文献10

  • 1Rosenberg J, Schulzrinne H.SIP: Session initiation protocol[S].2002.
  • 2Ring J, Choo K K R.A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography[C]//Proc of Aus CERT Asia Pacific Infor- mation Technology Security Conference.Brisbane:Univer- sity of Queensland Publication,2006: 57-72.
  • 3Wu L F, Zhang Y Q, Wang F J.A new provably secure authen-tication and key agreement protocol for SIP using ECC[J]. Computer Standards and Interface, 2009,31 (2) : 286-291.
  • 4Hankerson D, Menezes A, Vanstone S.Guide to elliptic curve cryptography[M].New York, USA: Springer-Verlag, 2004.
  • 5Yoon E J,Yoo K Y.A three-factor authenticated key agree- ment scheme for SIP on elliptic curves[C]//Proceedings of the 4th International Conference on Network and System Security (NSS' 10) .Piscataway: IEEE, 2010: 334-339.
  • 6唐宏斌,刘心松.对TAKA_(SIP)协议的分析和改进[J].计算机应用,2012,32(2):468-471. 被引量:4
  • 7吴昌,肖美华.基于SPIN的IKEv2协议高效模型检测[J].计算机工程与应用,2008,44(5):158-161. 被引量:5
  • 8Clarke E M, Grumberg O, Peled D A.Model checking[M]. London:MIT Press, 1999.
  • 9Holzmann G J.The spin model checker primer and ref- erence manual[M].Boston: Addison-Wesley, 2003.
  • 10Marrero W, Clarke E M, Jha S.A model checker for authentication protocols[C]//Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997.

二级参考文献12

共引文献7

同被引文献17

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部