A Security Formal Model for Multiple Channels Communication

被引:0
|
作者
Fu, Yulong [1 ]
Yuan, Xinyi [1 ]
Wang, Ke [1 ]
Yan, Zheng [1 ]
Li, Hui [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
基金
国家重点研发计划;
关键词
Formal Method for Security; Heterogeneous; networks; Applied Pi Calculus;
D O I
10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00258
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent heterogeneous networks, such as LTE-A and 5G, support roaming of mobilities between multiple domains and may require communications on different channels, which brought new challenges to network security. However, existed Formal Security Methods usually abstract the communications in networking systems with one public channel, which makes the modeling of heterogeneous networks become difficult. In this article, based on the basic syntax of Applied Pi Calculus, we define a multiple channel syntax and the corresponding semantic rules for the security analysis of heterogeneous networks. We applied the proposed methods on a typical 3GPP and Non 3GPP heterogeneous structure, and the results present that the method can support the formal security evaluation of heterogeneous networks.
引用
收藏
页码:1425 / 1430
页数:6
相关论文
共 50 条
  • [41] Verification of a formal security model for multiapplicative smart cards
    Schellhorn, G
    Reif, W
    Schairer, A
    Karger, P
    Austel, V
    Toll, D
    [J]. COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 17 - 36
  • [42] A formal model for network-wide security analysis
    Matousek, Petr
    Rab, Jaroslav
    Rysavy, Ondrej
    Sveda, Miroslav
    [J]. FIFTEENTH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2008, : 171 - 181
  • [43] A Unified Formal Model for Proving Security and Reliability Properties
    Hu, Wei
    Wu, Lingjuan
    Tai, Yu
    Tan, Jing
    Zhang, Jiliang
    [J]. 2020 IEEE 29TH ASIAN TEST SYMPOSIUM (ATS), 2020, : 30 - 35
  • [44] Using Refinement in Formal Development of OS Security Model
    Devyanin, Petr N.
    Khoroshilov, Alexey V.
    Kuliamin, Victor V.
    Petrenko, Alexander K.
    Shchepetkov, Ilya V.
    [J]. PERSPECTIVES OF SYSTEM INFORMATICS, PSI 2015, 2016, 9609 : 107 - 115
  • [45] Development of A Formal Security Model for Electronic Voting Systems
    Braeunlich, Katharina
    Grimm, Ruediger
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (02) : 1 - 28
  • [46] Cryptography as a formal method and model for security in electronic payments
    Tsiakis, T
    Stephanides, G
    Pekos, G
    [J]. INTERNET SOCIETY: ADVANCES IN LEARNING, COMMERCE AND SOCIETY, 2004, 1 : 235 - 242
  • [47] A Reinforcement Model for Collaborative Security and Its Formal Analysis
    Misra, Janardan
    Saha, Indranil
    [J]. NEW SECURITY PARADIGMS WORKSHOP 2009, PROCEEDINGS, 2009, : 101 - 114
  • [48] Provably secure multisignatures in formal security model and their optimality
    Komano, Yuichi
    Ohta, Kazuo
    Shimbo, Atsushi
    Kawamura, Shinichi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 107 - 118
  • [49] Formal Security Policy Model for a Common Criteria evaluation
    Park, Junkil
    Choi, Jin-Young
    [J]. 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 277 - +
  • [50] Security Foundations for Application-Based Covert Communication Channels
    Howes, James K.
    Georgiou, Marios
    Malozemoff, Alex J.
    Shrimpton, Thomas
    [J]. 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 1971 - 1986