The Automatic Verification and Improvement of SET Protocol Model with SMV

被引:0
|
作者
Lu Simei [1 ]
Zhang Jianlin [1 ]
Luo Liming [1 ]
机构
[1] Capital Normal Univ, Coll Informat Engn, Beijing, Peoples R China
关键词
electronic commerce; model checking; SET protocol; protocol attacks; SMV;
D O I
10.1109/IEEC.2009.96
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to make secure transactions over networks, various protocols have been proposed, but there are subtleties involved in original protocol design, some of them have been found after a long time after publication. In this paper, we used model checking method by means of SMV to verify SET protocol in Electronic Commerce. Model checking combines some of the advantages of both testing and theorem proving. Other advantages include that model checking can start once the first prototype of the model and specification have been finished. The symbolic model checking ware (SMV) was applied for analyzing the authentication, confidentiality and integrity of SET protocol, attacks were found. Then, the influence of attacks was discussed. Finally, the protocol model was optimized. The result of analyzation and checking indicates the importance of dual signature on SET protocol.
引用
收藏
页码:433 / 436
页数:4
相关论文
共 50 条
  • [1] Verification of protocol design using UML - SMV
    Prashanth, C.M.
    Chandrashekar Shet, K.
    World Academy of Science, Engineering and Technology, 2009, 36 : 544 - 548
  • [2] Automatic Verification of Acquisti Voting Protocol in Formal Model
    Meng, Bo
    Huang, Wei
    Wang, Dejun
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 148 - 150
  • [3] Improvement to information transaction model based on SET protocol
    Tian, Mengjin
    Yang, Yuhang
    Li, Jianhua
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 1999, 33 (01): : 84 - 87
  • [4] Automated verification of a randomized distributed consensus protocol using cadence SMV and PRISM
    Kwiatkowska, M
    Norman, G
    Segala, R
    COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2001, 2102 : 194 - 206
  • [5] The analysis and improvement of SET protocol
    Zhou, Cheng
    Chen, Xiyang
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1335 - 1340
  • [6] Automatic analyzer for security protocol verification
    Li, Xie-Hua
    Yang, Shu-Tang
    Li, Jian-Hua
    Zhu, Hong-Wen
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 104 - 109
  • [7] Verification and improvement of the sliding window protocol
    Chkliaev, D
    Hooman, J
    de Vink, E
    TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PROCEEDINGS, 2003, 2619 : 113 - 127
  • [8] Automatic verification of security properties of remote internet voting protocol in symbolic model
    Meng B.
    Huang W.
    Qin J.
    Information Technology Journal, 2010, 9 (08) : 1521 - 1556
  • [9] Verification of Multi Decisional Reactive Agent using SMV Model Checker
    Haqiq, Abdelhay
    Bounabat, Bouchaib
    2013 8TH INTERNATIONAL DESIGN AND TEST SYMPOSIUM (IDT), 2013,
  • [10] Enhanced Mobile SET Protocol with Formal Verification
    Ahamad, Shaik Shakeel
    Sastry, V. N.
    Udgata, Siba K.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGY (ICCCT), 2012, : 288 - 293