期刊文献+

基于无线通信的ASK协议的建模分析

Analysis and Modification of ASK Protocol Based On Wireless Communication
下载PDF
导出
摘要 安全协议的建模分析与设计一般采用形式化的方法进行,这是许多经典安全协议存在的缺陷。因此,文章提出采用形式化验证的方法对一种复杂的无线移动安全协议-ASK协议进行建模和验证,针对ASK协议所存在的缺陷,我们提出了改进之后的协议,并对改进后的协议进行了验证,结果表明,新的协议是安全的,是能够抵御重放攻击的。 Security protocols have been designed and verified using informal techniques. In the result, it is now well recog-nized that many security protocols which were previously proposed have found to be vulnerable later on. In this paper, we model and verify of the ASK protocol, which is a complicated mobile security protocol. After showing the vulnerability of the ASK protocol using formal verification approach, we propose a modification, and then show that the new protocol is se-cure against replay attack.
出处 《信息通信》 2015年第4期201-204,共4页 Information & Communications
关键词 ASK协议 形式化方法 验证 通信顺序进程 ASK Protocol Formal Methods Verification CSP
  • 相关文献

参考文献8

  • 1M.Abadi,M.Burrows and R.Needham".A Logic of Authentication",Proceeding of the Royal Society,Series A,426 ,1871,pp.233-271,December 1989.
  • 2陈建熊,孙乐昌.认证测试对分析重放攻击的缺陷[J].计算机应用研究,2009,26(2):739-741. 被引量:6
  • 3朱宜炳,罗敏.典型安全协议形式化分析工具比较[J].计算机与现代化,2008(5):86-89. 被引量:2
  • 4M.Aydos,B.Sunnar and C.K.Koc,"An elliptic curve cryptography based authentication and key agreement protocol for wireless communication",presented at the 2ed Int.Workshop Discrete Algorithms and Methods for Mobility,TX,Oct.1998.
  • 5A.Aziz and W.Diffie",Privacy and authentication for wireless local area networks",IEEE Personal Commun,First Quarter 25-31,1994.
  • 6C.A.R.Hoare.Communicating Sequential Processes.New York:Prentice-Hall,1985.
  • 7Needham R,Schroeder M.Using encryption for authentication in large networks of computers.Communications of the ACM.1978,21(12):993-999.
  • 8Dolev D,Yao A.On the security of public key protocols.IEEE Transactions on Information Theory,1983,29(2):198-208.

二级参考文献13

  • 1Dolev D,Yao A C. On the security of public key protocols [ C]//Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, 1981:350-357.
  • 2Burrows M, Abadi M, Needham R. A logic of authentication[J]. ACM Transactions on Computer Systems, 1990,8 (1) :18-36.
  • 3Clarke E M, Grumberg O, Peled D A. Model Checking [M]. Cambridge, MA: MIT Press, 1999.
  • 4Kindred D. Theory Generation for Security Protocols [ D ]. PhD thesis, Carnegie Mellon University, 1999.
  • 5Lowe G. Casper: A complier for the analysis of security protocols[J]. Journal of Computer Security, 1998,6 ( 1 ) : 53 -84.
  • 6Palol Maggi, Riccardo Sisto. Using SPIN to verify security properties of cryptographic protocols [ C ]// Proceedings of the 9th International SPIN Workshop on Model Checking of Software, Grenoble, France, April, 2002:187-204.
  • 7McMillan K L. Symbohc Model Checking: An Approach to the State Explosion Problem [ M ]. Kluwer Academic Publishers, 1993.
  • 8Meadows C. The NRL protocol analyzer: An overview[J]. Journal of Logic Programming, 1996, 26(2) :113-131.
  • 9Clarke E M, Jha S, Marrero W. Verifying security protocols with Brutus[ J]. ACM Transactions on Software Engineering and Methodology, 2000,9(4) : 443-487.
  • 10Lawrence C Paulson. The Isabelle Reference Manual [ M ]. University of Cambridge, Computer Laboratory ,2004.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部