We demonstrate the flaws of Mao's method, which is an augmentation ofprotocol idealization in BAN-like logics, and then offer some new idealization rules based on Mao'smethod. Furthermore, we give some theoret...We demonstrate the flaws of Mao's method, which is an augmentation ofprotocol idealization in BAN-like logics, and then offer some new idealization rules based on Mao'smethod. Furthermore, we give some theoretical analysis of our rules using the strand spaceformalism, and show the soundness of our idealization rules under strand spaces Some examples onusing the new rules to analyze security protocols are also concerned. Our idealization method ismore effective than Mao's method towards many protocol instances, and is supported by a formalmodel.展开更多
This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using t...This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using the extended Kailar logic, the security analysis of the improved prototocol has been presented. Key words non-repudiation protocol - extended Kailar logic - converse assumption procedure CLC number TP 393. 08 Foundation item: Supported by the National Natural Science Foundation of China (90104005) and the Doctoral Science Foundation of Ministry of Education (20020486046)Biography: Li Li(1976-), female, Ph. D candidate, research direction: network security and formal analysis of security protocol.展开更多
Security protocols are the basis of many mobile communication systems,thus it is important to ensure protocol property correct. Using Protocol Composition Logic (PCL),this paper proves a Mobile IP (MIP) registration p...Security protocols are the basis of many mobile communication systems,thus it is important to ensure protocol property correct. Using Protocol Composition Logic (PCL),this paper proves a Mobile IP (MIP) registration protocol that is based on certificateless public key signature without pairing between home agent and foreign agent,which minimizes the registration time and cost as well as improves the security compared with the identity-based and certificate-based registration protocol. Analysis and proof shows that the proposed protocol provides users security and authentications,moreover,the anonymity property is proved correct.展开更多
We present a model based on Computational Temporal Logic (CTL) methods forverifying security requirements of electronic commerce, protocols. The model describes formally theauthentication, confidentiality integrity, n...We present a model based on Computational Temporal Logic (CTL) methods forverifying security requirements of electronic commerce, protocols. The model describes formally theauthentication, confidentiality integrity, non-repudiation) denial of serviee and access control ofthe e-lectronic commerce protocols. We illustrate as case study a variant of the Lu-Smolka protocolproposed by Lu-Smolka Moreover, we have discovered two attacks that allow a dishonest user topurchase a good debiting the amountto another user. And also, we compared our work with relativeresearch works and found lhat the formal way of this paper is more general to specify securityprotocols for E-Commerce.展开更多
Wireless Sensor Networks (WSNs) are used in different civilian, military, and industrial applications. Recently, many routing protocols have been proposed attempting to find suitable routes to transmit data. In this p...Wireless Sensor Networks (WSNs) are used in different civilian, military, and industrial applications. Recently, many routing protocols have been proposed attempting to find suitable routes to transmit data. In this paper we propose a Fuzzy Energy Aware tree-based Routing (FEAR) protocol that aims to enhance existing tree-based routing protocols and prolong the network’s life time by considering sensors’ limited energy. The design and implementation of the new protocol is based on cross-layer structure where information from different layers are utilized to achieve the best power saving. Each node maintains a list of its neighbors in order to use neighbors’links in addition to the parent-child links. The protocol is tested and compared with other tree-based protocols and the simulation results show that FEAR protocol is more energy-efficient than comparable protocols. According to the results FEAR protocol saves up to 70.5% in the number of generated control messages and up to 55.08% in the consumed power.展开更多
E-commerce protocols for the electronic purchase of goods are difficult to design and implement due to their complexity and high security demands. Fairness of such protocols in literature highly depends on an addition...E-commerce protocols for the electronic purchase of goods are difficult to design and implement due to their complexity and high security demands. Fairness of such protocols in literature highly depends on an additional TTP(trusted third party). However, it is difficult to find such a TTP in some situations. In addition, fairness for customers has been neither fully considered nor well satisfied in existing electronic purchasing protocols. In this paper, a new protocol FEP (fair electronic purchase) without a special TTP but an online bank is presented based on a concurrent digital signature scheme. The FEP protocol guarantees fair electronic purchase of goods via electronic payment between consumers, merchants and their online banks. The protocol is practical and the analysis based on the game logics shows that it achieves the properties of viability, fairness, and timeliness.展开更多
无线传感器网络由于基础设施建设等固有因素,必须考虑网络资源有限和资源消耗不均匀的问题。基于群智能模糊控制,将模糊控制引入群智能人工蜂群路由协议,解决软件定义传感器网络下的多径路由规划寻优问题。基于无线传感器网络的软件定...无线传感器网络由于基础设施建设等固有因素,必须考虑网络资源有限和资源消耗不均匀的问题。基于群智能模糊控制,将模糊控制引入群智能人工蜂群路由协议,解决软件定义传感器网络下的多径路由规划寻优问题。基于无线传感器网络的软件定义网络(Software Defined Networking for Wireless Sensor Networks,SDN-WISE)架构和群智能算法,通过产生人工蜂群模拟蜜蜂采蜜的过程搜索最优链路。人工蜂群对不同数据传输链路进行调整,利用模糊逻辑判断区域状态,并通过生成适应度函数评价出价值最高的数据链路,产生一个优化路由解决方案。实验结果表明,与经典路由算法对比,本文基于软件定义无线传感器网络(Software Defined Wireless Sensor Network,SD-WSN)的模糊人工蜂群优化路由(Fuzzy Artificial Bee Colony Routing,FABCR)机制,采用SDN-WISE在松耦合的软件定义网络架构下,融合人工蜂群的代理自适应能力与模糊控制的容错逻辑,使得优化路由问题求解过程在能量管理、网络利用率、传输时延和数据包传达率上均有明显的优势。展开更多
文摘We demonstrate the flaws of Mao's method, which is an augmentation ofprotocol idealization in BAN-like logics, and then offer some new idealization rules based on Mao'smethod. Furthermore, we give some theoretical analysis of our rules using the strand spaceformalism, and show the soundness of our idealization rules under strand spaces Some examples onusing the new rules to analyze security protocols are also concerned. Our idealization method ismore effective than Mao's method towards many protocol instances, and is supported by a formalmodel.
文摘This paper proposes an improved non-repudiation protocol after pointing out two attacks on an existing non-repudiation protocol. To analyze the improved protocol, it also proposes an extension of Kailar logic. Using the extended Kailar logic, the security analysis of the improved prototocol has been presented. Key words non-repudiation protocol - extended Kailar logic - converse assumption procedure CLC number TP 393. 08 Foundation item: Supported by the National Natural Science Foundation of China (90104005) and the Doctoral Science Foundation of Ministry of Education (20020486046)Biography: Li Li(1976-), female, Ph. D candidate, research direction: network security and formal analysis of security protocol.
基金Supported by the National Natural Science Foundation of China (No.60572147)State Key Laboratory Specific Foundation (ISN090307)the 111 Project (B08038)
文摘Security protocols are the basis of many mobile communication systems,thus it is important to ensure protocol property correct. Using Protocol Composition Logic (PCL),this paper proves a Mobile IP (MIP) registration protocol that is based on certificateless public key signature without pairing between home agent and foreign agent,which minimizes the registration time and cost as well as improves the security compared with the identity-based and certificate-based registration protocol. Analysis and proof shows that the proposed protocol provides users security and authentications,moreover,the anonymity property is proved correct.
基金Supported by the Natural Science Foundation ofthe Department of Education of Guangdong Province (Z03001)
文摘We present a model based on Computational Temporal Logic (CTL) methods forverifying security requirements of electronic commerce, protocols. The model describes formally theauthentication, confidentiality integrity, non-repudiation) denial of serviee and access control ofthe e-lectronic commerce protocols. We illustrate as case study a variant of the Lu-Smolka protocolproposed by Lu-Smolka Moreover, we have discovered two attacks that allow a dishonest user topurchase a good debiting the amountto another user. And also, we compared our work with relativeresearch works and found lhat the formal way of this paper is more general to specify securityprotocols for E-Commerce.
文摘Wireless Sensor Networks (WSNs) are used in different civilian, military, and industrial applications. Recently, many routing protocols have been proposed attempting to find suitable routes to transmit data. In this paper we propose a Fuzzy Energy Aware tree-based Routing (FEAR) protocol that aims to enhance existing tree-based routing protocols and prolong the network’s life time by considering sensors’ limited energy. The design and implementation of the new protocol is based on cross-layer structure where information from different layers are utilized to achieve the best power saving. Each node maintains a list of its neighbors in order to use neighbors’links in addition to the parent-child links. The protocol is tested and compared with other tree-based protocols and the simulation results show that FEAR protocol is more energy-efficient than comparable protocols. According to the results FEAR protocol saves up to 70.5% in the number of generated control messages and up to 55.08% in the consumed power.
基金the National High Technology Research and Development Program of China (2007AA01Z471)
文摘E-commerce protocols for the electronic purchase of goods are difficult to design and implement due to their complexity and high security demands. Fairness of such protocols in literature highly depends on an additional TTP(trusted third party). However, it is difficult to find such a TTP in some situations. In addition, fairness for customers has been neither fully considered nor well satisfied in existing electronic purchasing protocols. In this paper, a new protocol FEP (fair electronic purchase) without a special TTP but an online bank is presented based on a concurrent digital signature scheme. The FEP protocol guarantees fair electronic purchase of goods via electronic payment between consumers, merchants and their online banks. The protocol is practical and the analysis based on the game logics shows that it achieves the properties of viability, fairness, and timeliness.
文摘无线传感器网络由于基础设施建设等固有因素,必须考虑网络资源有限和资源消耗不均匀的问题。基于群智能模糊控制,将模糊控制引入群智能人工蜂群路由协议,解决软件定义传感器网络下的多径路由规划寻优问题。基于无线传感器网络的软件定义网络(Software Defined Networking for Wireless Sensor Networks,SDN-WISE)架构和群智能算法,通过产生人工蜂群模拟蜜蜂采蜜的过程搜索最优链路。人工蜂群对不同数据传输链路进行调整,利用模糊逻辑判断区域状态,并通过生成适应度函数评价出价值最高的数据链路,产生一个优化路由解决方案。实验结果表明,与经典路由算法对比,本文基于软件定义无线传感器网络(Software Defined Wireless Sensor Network,SD-WSN)的模糊人工蜂群优化路由(Fuzzy Artificial Bee Colony Routing,FABCR)机制,采用SDN-WISE在松耦合的软件定义网络架构下,融合人工蜂群的代理自适应能力与模糊控制的容错逻辑,使得优化路由问题求解过程在能量管理、网络利用率、传输时延和数据包传达率上均有明显的优势。