A formal analysis method for composition protocol based on model checking

被引:3
|
作者
Xiao, Meihua [1 ]
Zhao, Hanyu [1 ]
Yang, Ke [1 ]
Ri Ouyang [1 ]
Song, Weiwei [1 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
AUTHENTICATION; VERIFICATION; SECURITY;
D O I
10.1038/s41598-022-12448-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Protocol security in a composition protocol environment has always been an open problem in the field of formal analysis and verification of security protocols. As a well-known tool to analyze and verify the logical consistency of concurrent systems, SPIN (Simple Promela Interpreter) has been widely used in the analysis and verification of the security of a single protocol. There is no special research on the verification of protocol security in a composition protocol environment. To solve this problem, firstly, a formal analysis method for composition protocol based on SPIN is proposed, and a formal description of protocol operation semantics is given. Then the attacker model is formalized, and a message specification method based on field detection and component recognition is presented to alleviate the state explosion problem. Finally, the NSB protocol and the NSL protocol are used as examples for compositional analysis. It is demonstrated that the proposed method can effectively verify the security of the protocol in a composition protocol environment and enhance the efficiency of composition protocol verification.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] A formal analysis method for composition protocol based on model checking
    Meihua Xiao
    Hanyu Zhao
    Ke Yang
    Ri Ouyang
    Weiwei Song
    [J]. Scientific Reports, 12
  • [2] Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
    Yang, Huihui
    Prinz, Andreas
    Oleshchuk, Vladmir
    [J]. 2016 24TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP), 2016, : 553 - 557
  • [3] Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking
    Zhang, Jingjing
    Yang, Lin
    Gao, Xianming
    Tang, Gaigai
    Zhang, Jiyong
    Wang, Qiang
    [J]. IEEE ACCESS, 2021, 9 : 14836 - 14848
  • [4] Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification
    Patel, Reema
    Borisaniya, Bhavesh
    Patel, Avi
    Patel, Dhiren
    Rajarajan, Muttukrishnan
    Zisman, Andrea
    [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 152 - +
  • [5] Formal security analysis of Ariadne secure routing protocol using model checking
    Onem, E.
    Gurdag, A. Burak
    Caglayan, M. Ufuk
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 9 (01) : 12 - 24
  • [6] A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking
    Zhang, Jingjing
    Gao, Xianming
    Yang, Lin
    Feng, Tao
    Li, Dongyang
    Wang, Qiang
    Amin, Ruhul
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] Formal verification of a group membership protocol using model checking
    Rosset, Valerio
    Souto, Pedro F.
    Vasques, Francisco
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPLS, DOA, ODBASE, GADA, AND IS, PT 1, PROCEEDINGS, 2007, 4803 : 471 - 488
  • [8] A formal model for checking the convergence property of border gateway protocol
    Yin, Ping
    Ma, Yinxue
    [J]. ICIC Express Letters, Part B: Applications, 2014, 5 (06): : 1753 - 1758
  • [9] Formal Specification and Model Checking of an Autonomous Vehicle Merging Protocol
    Liu, Minxuan
    Dang Duy Bui
    Duong Dinh Tran
    Ogata, Kazuhiro
    [J]. 2021 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2021), 2021, : 333 - 342
  • [10] Formal Analysis on the TCP Protocol Based on B method
    Liu, Kening
    Ye, Junyao
    Wang, Yinglian
    [J]. 2015 4TH INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL PROTECTION (ICEEP 2015), 2015, : 584 - 587