The Automatic Verification and Improvement of SET Protocol Model with SMV

被引:0
|
作者
Lu Simei [1 ]
Zhang Jianlin [1 ]
Luo Liming [1 ]
机构
[1] Capital Normal Univ, Coll Informat Engn, Beijing, Peoples R China
关键词
electronic commerce; model checking; SET protocol; protocol attacks; SMV;
D O I
10.1109/IEEC.2009.96
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to make secure transactions over networks, various protocols have been proposed, but there are subtleties involved in original protocol design, some of them have been found after a long time after publication. In this paper, we used model checking method by means of SMV to verify SET protocol in Electronic Commerce. Model checking combines some of the advantages of both testing and theorem proving. Other advantages include that model checking can start once the first prototype of the model and specification have been finished. The symbolic model checking ware (SMV) was applied for analyzing the authentication, confidentiality and integrity of SET protocol, attacks were found. Then, the influence of attacks was discussed. Finally, the protocol model was optimized. The result of analyzation and checking indicates the importance of dual signature on SET protocol.
引用
收藏
页码:433 / 436
页数:4
相关论文
共 50 条
  • [11] Automatic Component Protocol Generation and Verification of Components
    Both, Andreas
    Richter, Dirk
    36TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS, 2010, : 94 - 101
  • [12] Formal specification and verification of the SET/A protocol with an integrated approach
    Lam, VSW
    Padget, J
    CEC 2004: IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY, PROCEEDINGS, 2004, : 229 - 235
  • [13] Formal verification of the Merchant Registration phase of the SET protocol
    Xiao-Qi Ma
    Xiao-Chun Cheng
    International Journal of Automation and Computing, 2005, 2 (2) : 155 - 162
  • [14] Formal Verification of the Merchant Registration Phase of the SET Protocol
    Ma, Xiao-Qi
    Cheng, Xiao-Chun
    INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2005, 2 (02) : 155 - 162
  • [16] A method for automatic cryptographic protocol verification (extended abstract)
    Goubault-Larrecq, J
    PARALLEL AND DISTRIBUTED PROCESSING, PROCEEDINGS, 2000, 1800 : 977 - 984
  • [17] An Automatic Parameterized Verification of FLASH Cache Coherence Protocol
    Li, Yongjian
    Cao, Jialun
    Duan, Kaiqiang
    2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2018), 2018, : 47 - 58
  • [18] Automatic Verification of Security of OpenID Connect Protocol with ProVerif
    Lu, Jintian
    Zhang, Jinli
    Li, Jing
    Wan, Zhongyu
    Meng, Bo
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 209 - 220
  • [19] Automatic verification of hybrid systems: An audio control protocol
    Abbate, LRS
    SCCC'98 - XVIII INTERNATIONAL CONFERENCE OF THE CHILEAN SOCIETY OF COMPUTER SCIENCE, PROCEEDINGS, 1998, : 184 - 191
  • [20] Verification of mutual exclusion algorithms with SMV System
    Bogunovic, N
    Pek, E
    IEEE REGION 8 EUROCON 2003, VOL B, PROCEEDINGS: COMPUTER AS A TOOL, 2003, : 21 - 25