Formal modeling and security analysis method of security protocol based on CPN

被引:0
|
作者
Gong, Xiang [1 ]
Feng, Tao [1 ]
Du, Jinze [1 ]
机构
[1] School of Computer and Communication, Lanzhou University of Technology, Lanzhou,730050, China
来源
关键词
收稿日期:2021−01−04; 修回日期:2021−04−03; 基金项目:国家自然科学基金资助项目(No; 62162039; No; 61762060); 甘肃省高等学校科研基金资助项目(No.2017C-05); 甘肃省科 技厅重点研发计划基金资助项目(No.20YF3GA016) Foundation Items: The National Natural Science Foundation of China (No.62162039; No.61762060); Educational Commission of Gansu Province (No.2017C-05); Foundation for the Key Research and Development Program of Gansu Province (No.20YF3GA016);
D O I
10.11959/j.issn.1000-436x.2021175
中图分类号
学科分类号
摘要
25
引用
收藏
页码:240 / 253
相关论文
共 50 条
  • [1] Formal Security Evaluation and Research of Automotive CAN Protocol Based on CPN
    Feng, Tao
    Zheng, Lu
    Xie, Peng-Shou
    [J]. International Journal of Network Security, 2022, 24 (02) : 352 - 363
  • [2] A formal Modeling method based on CPN
    Li, Shancang
    Zhang, Deyun
    Li, Zongbin
    Ma, Fuhai
    Wu, Feng
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 4994 - +
  • [3] A reduction method for verification of security protocol through CPN
    Ding, Yanlan
    Su, Guiping
    [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 73 - 77
  • [4] Formal Security Analysis of the MaCAN Protocol
    Bruni, Alessandro
    Sojka, Michal
    Nielson, Flemming
    Nielson, Hanne Riis
    [J]. INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 241 - 255
  • [5] On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
    Bruce, Ndibanje
    Kim, HyunHo
    Kang, Young Jin
    Lee, Young Sil
    Lee, Hoon Jae
    [J]. 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 498 - 505
  • [6] A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace a nd Security Protocol Implementation Ontology
    He, Xudong
    Liu, Jiabing
    Huang, Chin-Tser
    Wang, Dejun
    Meng, Bo
    [J]. IEEE ACCESS, 2019, 7 : 131050 - 131067
  • [7] Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol
    Feng, Tao
    Wu, Yi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [8] A Security Analysis Method for Security Protocol Implementations Based on Message Construction
    Lu, Jintian
    Yao, Lili
    He, Xudong
    Huang, Chintser
    Wang, Dejun
    Meng, Bo
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (12):
  • [9] Formal Procedural Security Modeling and Analysis
    Weldemariam, Komminist
    Villafiorita, Adolfo
    [J]. CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 249 - +
  • [10] A Formal Security Analysis of the Signal Messaging Protocol
    Cohn-Gordon, Katriel
    Cremers, Cas
    Dowling, Benjamin
    Garratt, Luke
    Stebila, Douglas
    [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 451 - 466