A Security Formal Model for Multiple Channels Communication

被引:0
|
作者
Fu, Yulong [1 ]
Yuan, Xinyi [1 ]
Wang, Ke [1 ]
Yan, Zheng [1 ]
Li, Hui [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
基金
国家重点研发计划;
关键词
Formal Method for Security; Heterogeneous; networks; Applied Pi Calculus;
D O I
10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00258
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent heterogeneous networks, such as LTE-A and 5G, support roaming of mobilities between multiple domains and may require communications on different channels, which brought new challenges to network security. However, existed Formal Security Methods usually abstract the communications in networking systems with one public channel, which makes the modeling of heterogeneous networks become difficult. In this article, based on the basic syntax of Applied Pi Calculus, we define a multiple channel syntax and the corresponding semantic rules for the security analysis of heterogeneous networks. We applied the proposed methods on a typical 3GPP and Non 3GPP heterogeneous structure, and the results present that the method can support the formal security evaluation of heterogeneous networks.
引用
收藏
页码:1425 / 1430
页数:6
相关论文
共 50 条
  • [1] A MODEL FOR USING MULTIPLE COMMUNICATION CHANNELS IN SIGNAL-SECURITY SYSTEMS
    Kralev, Velin
    [J]. AEROSPACE RESEARCH IN BULGARIA, 2007, 21 : 181 - 187
  • [2] Formal model for inter-component communication and its security in android
    Mohamed A. El-Zawawy
    Parvez Faruki
    Mauro Conti
    [J]. Computing, 2022, 104 : 1839 - 1865
  • [3] Formal model for inter-component communication and its security in android
    El-Zawawy, Mohamed A.
    Faruki, Parvez
    Conti, Mauro
    [J]. COMPUTING, 2022, 104 (08) : 1839 - 1865
  • [4] Formal security analysis of near field communication using model checking
    Alexiou, Nikolaos
    Basagiannis, Stylianos
    Petridou, Sophia
    [J]. COMPUTERS & SECURITY, 2016, 60 : 1 - 14
  • [5] Formal security model of multisignatures
    Komano, Yuichi
    Ohta, Kazuo
    Shimbo, Atsushi
    Kawamura, Shinichi
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 146 - 160
  • [6] Reconstructing a formal security model
    Ahn, GJ
    Hong, SP
    Shin, ME
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2002, 44 (11) : 649 - 657
  • [7] The Simplified Two Generals Problem for Communication Immutability and Security Over Multiple Heterogeneous Channels
    Pshehotskaya, Ekaterina
    Mikhalsky, Oleg
    Vinnikov, Vladimir
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7377 - 7382
  • [8] FORMAL COMMUNICATION CHANNELS IN A STATE HOSPITAL: A QUALITATIVE STUDY
    Ozdemir-Gungor, Dilek
    Kidak, Levent Bekir
    Ercan, Yasemin
    [J]. IIOAB JOURNAL, 2018, 9 (06) : 48 - 55
  • [9] INFORMAL AND FORMAL CHANNELS IN BOUNDARY-SPANNING COMMUNICATION
    WEEDMAN, J
    [J]. JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE, 1992, 43 (03): : 257 - 267
  • [10] A formal security model for microprocessor hardware
    Lotz, V
    Kessler, V
    Walter, G
    [J]. FM'99-FORMAL METHODS, 1999, 1708 : 718 - 737