Formal Analysis of the Security Protocol with Timestamp Using SPIN

被引:2
|
作者
Xiao, Meihua [1 ]
Song, Weiwei [1 ]
Yang, Ke [1 ]
OuYang, Ri [1 ]
Zhao, Hanyu [1 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
AUTHENTICATION PROTOCOL;
D O I
10.1155/2022/2420590
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensure network security. However, previous formal analysis method of such protocols often extracted timestamps into random numbers in order to simplify the model before modeling and verification, which probably cause time-dependent security properties that are ignored. To solve this problem, a method for verifying security protocols with timestamps using model checking technique is proposed in this paper. To preserve the time-dependent properties of the protocol, Promela (process meta language) is utilized to define global clock representing the protocol system time, timer representing message transmission time, and the clock function representing the passage of time; in addition, a mechanism for checking timestamps in messages is built using Promela. To mitigate state space explosion in model checking, we propose a vulnerable channel priority method of using Promela to build intruder model. We take the famous WMF protocol as an example by modeling it with Promela and verifying it with model checker SPIN (Simple Promela Interpreter), and we have successfully found two attacks in the protocol. The results of our work can make some security schemes based on WMF protocol used in the Internet of things or other fields get security alerts. The results also show that our method is effective, and it can provide a direction for the analysis of other security protocols with timestamp in many fields.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Formal Security Analysis of the MaCAN Protocol
    Bruni, Alessandro
    Sojka, Michal
    Nielson, Flemming
    Nielson, Hanne Riis
    [J]. INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 241 - 255
  • [2] A Formal Security Analysis of the Signal Messaging Protocol
    Cohn-Gordon, Katriel
    Cremers, Cas
    Dowling, Benjamin
    Garratt, Luke
    Stebila, Douglas
    [J]. 2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2017, : 451 - 466
  • [3] A Formal Security Analysis of the Signal Messaging Protocol
    Cohn-Gordon, Katriel
    Cremers, Cas
    Dowling, Benjamin
    Garratt, Luke
    Stebila, Douglas
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1914 - 1983
  • [4] A Formal Security Analysis of the Signal Messaging Protocol
    Katriel Cohn-Gordon
    Cas Cremers
    Benjamin Dowling
    Luke Garratt
    Douglas Stebila
    [J]. Journal of Cryptology, 2020, 33 : 1914 - 1983
  • [5] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [6] Formal security analysis of Ariadne secure routing protocol using model checking
    Onem, E.
    Gurdag, A. Burak
    Caglayan, M. Ufuk
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 9 (01) : 12 - 24
  • [7] Formal modeling and security analysis method of security protocol based on CPN
    Gong, Xiang
    Feng, Tao
    Du, Jinze
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253
  • [8] Protocol engineering applied to formal analysis of security systems
    Lopez, J
    Ortega, JJ
    Troya, JM
    [J]. INFRASTRUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 246 - 259
  • [9] An Improved Security Protocol Formal Analysis with BAN Logic
    Li Tingyuan
    Liu Xiaodong
    Qin Zhiguang
    Zhang Xuanfang
    [J]. ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 102 - +
  • [10] Formal modeling and analysis of security schemes of RPL protocol using colored Petri nets
    Ahmad, Farooq
    Chaudhry, Muhammad Tayyab
    Jamal, Muhammad Hasan
    Sohail, Muhammad Amar
    Gavilanes, Daniel
    Masias Vergara, Manuel
    Ashraf, Imran
    [J]. PLOS ONE, 2023, 18 (08):