Formal Analysis of the Security Protocol with Timestamp Using SPIN

被引:2
|
作者
Xiao, Meihua [1 ]
Song, Weiwei [1 ]
Yang, Ke [1 ]
OuYang, Ri [1 ]
Zhao, Hanyu [1 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
AUTHENTICATION PROTOCOL;
D O I
10.1155/2022/2420590
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensure network security. However, previous formal analysis method of such protocols often extracted timestamps into random numbers in order to simplify the model before modeling and verification, which probably cause time-dependent security properties that are ignored. To solve this problem, a method for verifying security protocols with timestamps using model checking technique is proposed in this paper. To preserve the time-dependent properties of the protocol, Promela (process meta language) is utilized to define global clock representing the protocol system time, timer representing message transmission time, and the clock function representing the passage of time; in addition, a mechanism for checking timestamps in messages is built using Promela. To mitigate state space explosion in model checking, we propose a vulnerable channel priority method of using Promela to build intruder model. We take the famous WMF protocol as an example by modeling it with Promela and verifying it with model checker SPIN (Simple Promela Interpreter), and we have successfully found two attacks in the protocol. The results of our work can make some security schemes based on WMF protocol used in the Internet of things or other fields get security alerts. The results also show that our method is effective, and it can provide a direction for the analysis of other security protocols with timestamp in many fields.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Formal Support to Security Protocol Development: A Survey
    Carlos Lopez Pimentel, Juan
    Monroy, Raul
    [J]. COMPUTACION Y SISTEMAS, 2008, 12 (01): : 89 - 108
  • [32] Formal verification of security protocol implementations: a survey
    Avalle, Matteo
    Pironti, Alfredo
    Sisto, Riccardo
    [J]. FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 99 - 123
  • [33] Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther
    Pradeep, R.
    Sunitha, N. R.
    Ravi, V
    Verma, Sushma
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [34] Formal specification and security verification of the IDKE protocol using FDR model checking
    Soltwisch, R
    Tegeler, F
    Hogrefe, D
    [J]. 2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 329 - 334
  • [35] Formal Analysis and Optimization of TLS1.3 Protocol in Strong Security Model
    Lu, Si-Qi
    Zhou, Si-Yuan
    Mao, Ying
    [J]. Ruan Jian Xue Bao/Journal of Software, 2021, 32 (09): : 2849 - 2866
  • [36] Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool
    Asadi, Sepideh
    Shahhoseini, Hadi Shahriar
    [J]. 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1060 - 1064
  • [37] Formal Analysis of the Signal Protocol using the Scyther Tool
    Almuzaini, Nawal Zaied
    Ahmad, Iftikhar
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [38] Analysis of LEACH Protocol(s) using Formal Verification
    Ihsan, A.
    Saghar, K.
    Fatima, T.
    [J]. 2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 254 - 262
  • [39] Analysis of the OLSR Protocol by Using Formal Passive Testing
    Andres, Cesar
    Maag, Stephane
    Cavalli, Ana
    Merayo, Mercedes G.
    Nunez, Manuel
    [J]. APSEC 09: SIXTEENTH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2009, : 152 - +
  • [40] Formal analysis of QUIC handshake protocol using ProVerif
    Zhang, Jingjing
    Yang, Lin
    Gao, Xianming
    Wang, Qiang
    [J]. 2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), 2020, : 132 - 138