期刊文献+

带有异或运算安全协议的自动化检测 被引量:1

Automatic detection of security protocols with XOR
在线阅读 下载PDF
导出
摘要 针对当前模型检测工具普遍不能检测带有异或运算安全协议的问题,提出了一个新的模型检测器SAT#.该模型检测器通过引入抽象异或项的概念及其运算规则,大大降低了攻击者生成的异或消息数量,解决了由于引入传统异或运算导致的状态空间爆炸问题.在此基础上,通过在SAT模型中增加基于抽象异或项的重写规则,扩展了攻击者的异或运算能力,实现了对带有异或运算安全协议的自动化检测.通过对BULL协议的检测,证明了抽象异或项的实用性,同时也证明了SAT#模型检测器的可靠性. Since most of the current model checking tools can not detect security protocols with XOR, a new model checker named SAT# is proposed. By defining the concept of abstract XOR term and its reduction rules, the new model greatly reduces the number of XOR messages produced by the intruder, and resolves the state space explosion problem resulting from the introduction of XOR operations, on the basis of which by adding the rewrite rules of XOR based on the abstract XOR term, the new model endows the intruder with the XOR operations, and thus is able to automatically detect the security protocols with XOR. The detection results of the BULL protocol show not only the practicality of the abstract XOR term but also the reliability of the SAT# .
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2012年第4期120-125,183,共7页 Journal of Xidian University
基金 国家自然科学基金资助项目(61072140) 高等学校创新引智计划资助项目(B08038) 高等学校博士学科点专项科研基金资助项目(20100203110003) 陕西省教育厅科研计划资助项目(2010JK825)
关键词 安全协议 形式化分析 模型检测 代数性质 security protocols formal analyses model checking algebraic properties
  • 相关文献

参考文献10

  • 1Veronique C, Steve K, Bogdan W. A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems [J]. Journal of Automated Reasoning, 2011, 46(3-4) : 225-259.
  • 2Vincent C, Hubert C, Stephanie D. Automating Security Analysis: Symbolic Equivalence of Constraint Systems [C] // The 5th International Joint Conference on Automated Reasoning. Wroelaw: Springer, 2010: 412-426.
  • 3Stephanie D, Steve K, Mark D R. Symbolic Bisimulation for the Applied pi Calculus[J]. Journal of Computer Security, 2010, 18(2): 317-377.
  • 4Chevalier Y, Kusters R, Rusinowitch M, et al. An NP Decision Procedure for Protocol Insecurity with XOR [J]. Theoretical Computer Science, 2005, 338(1-3) : 247-274.
  • 5Rail K, Tomasz T. On the Automatic Analysis of Recursive Security Protocols with XOR[C]//24th Annual Symposium on Theoretical Aspects of Computer Science. Aachen: Springer, 2007: 646-657.
  • 6Veronique C, Gavin K, Graham S. Automatic Analysis of the Security of XOR-Based Key Management Schemes[C]// 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Braga: Springer, 2007 : 538-552.
  • 7Ralf K, Tomasz T. Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach [C]//15th ACM Conference on Computer and Communications Security. Alexandria: ACM, 2008: 129-138.
  • 8Alessandro A, Luca C. SAT-based Model-checking for Security Protocols Analysis [J]. International Journal of Information Security, 2008, 7(1) : 3-32.
  • 9Marques-Silva J P, Sakallah K A. GRASP--a Search Algorithm for Propositional Satisfiability[J]. IEEE Trans on Computers, 1999, 48(5): 506-521.
  • 10杜志强,沈玉龙,马建峰,周利华.一种实用的传感器网络广播认证协议[J].西安电子科技大学学报,2010,37(2):305-310. 被引量:5

二级参考文献18

  • 1沈玉龙,裴庆祺,马建峰.MMμTESLA:多基站传感器网络广播认证协议[J].计算机学报,2007,30(4):539-546. 被引量:18
  • 2Jens-Matthias B,Alban H,Osman U.A Secure and Resilient WSN Roadside Architecture for Intelligent Transport Systems[C]//Proceedings of the First ACM Conference on Wireless Network Security.New York:ACM,2008:161-171.
  • 3霍宏伟 张宏科 张思东.一种面向铁路轨道监测的无线传感器网络模型研究.西安电子科技大学学报,2007,34(1):35-38.
  • 4Zhang Y C,Liu W,Lou W J,et al.Location-based Compromise Tolerant Security Mechanisms in Wireless Sensor Networks[J].Areas Communication Special Issue Security Wireless Ad Hoe Networks,2006,24(2):247-260.
  • 5Dong Q,Liu D G,Ning P.Pre-authentication Filters:Providing Dos Resistance for Signature-based Broadcast Authentication in Sensor Networks[C]//Proceedings of the First ACM Conference on Wireless Network Security.New York:ACM,2008:2-12.
  • 6Ren K,Zeng K,Lou W J,et al.On Broadcast Authentication in Wireless Sensor Networks[J].IEEE Transactions on Wireless Communications,2007,6(11):4136-4144.
  • 7Ayday E,Delgosha F,Fekri F.Efficient Broadcast Authentication for Wireless Sensor Networks[C]//Networking Technologies for Software Define Radio Networks,2007 2nd IEEE Workshop.San Diego:IEEE Computer Society,2007:61-62.
  • 8Chang S M,Shieh S,Lin w w,et al.An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks[C]//Proceedings of the 2006 ACM Symposium on Information,Computer and Communications Security ASIACCS'06.San Diego:IEEE Computer Society,2006:311-320.
  • 9Perrig A,Szewczyk R,Wen V,et al.SPINS:Security Protocols for Sensor Networks[J].Wireless Networks Journal,2002.8(5):521-534.
  • 10Liu D G,Ning P.Multi-level μTESLA:Broadcast Authentication for Distributed Sensor Networks[J].ACM Trans in Embedded Computing Systems(TECS),2004,3(4):800-836.

共引文献4

同被引文献13

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部