The Automatic Verification and Improvement of SET Protocol Model with SMV

被引:0
|
作者
Lu Simei [1 ]
Zhang Jianlin [1 ]
Luo Liming [1 ]
机构
[1] Capital Normal Univ, Coll Informat Engn, Beijing, Peoples R China
关键词
electronic commerce; model checking; SET protocol; protocol attacks; SMV;
D O I
10.1109/IEEC.2009.96
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to make secure transactions over networks, various protocols have been proposed, but there are subtleties involved in original protocol design, some of them have been found after a long time after publication. In this paper, we used model checking method by means of SMV to verify SET protocol in Electronic Commerce. Model checking combines some of the advantages of both testing and theorem proving. Other advantages include that model checking can start once the first prototype of the model and specification have been finished. The symbolic model checking ware (SMV) was applied for analyzing the authentication, confidentiality and integrity of SET protocol, attacks were found. Then, the influence of attacks was discussed. Finally, the protocol model was optimized. The result of analyzation and checking indicates the importance of dual signature on SET protocol.
引用
收藏
页码:433 / 436
页数:4
相关论文
共 50 条
  • [21] Verification of sequential function charts using SMV
    Bornot, S
    Huuck, R
    Lukoschus, B
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 2987 - 2993
  • [22] Automatic verification of coercion-resistance in remote internet voting protocol with CryptoVerif in computational model
    Meng, B. (mengscuec@gmail.com), 1600, Advanced Institute of Convergence Information Technology (06):
  • [23] Automatic verification of a model checker by reflection
    Wang, BY
    PRACTICAL ASPECTS OF DECLARATIVE LANGUAGES, 2006, 3819 : 45 - 59
  • [24] AUTOMATIC VERIFICATION SET FOR VOLTMETERS IN THE 1 TO 1000 MHZ RANGE
    TELITCHENKO, GP
    SHCHEGLOV, VA
    MEASUREMENT TECHNIQUES USSR, 1990, 33 (04): : 381 - 383
  • [25] Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol
    He, Xin
    Kumar, Ram
    Mu, Liping
    Gjosaeter, Terje
    Li, Frank Y.
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 343 - 354
  • [26] Cryptanalysis and improvement of a quantum private set intersection protocol
    Cheng, Xiaogang
    Guo, Ren
    Chen, Yonghong
    QUANTUM INFORMATION PROCESSING, 2017, 16 (02)
  • [27] Cryptanalysis and improvement of a quantum private set intersection protocol
    Xiaogang Cheng
    Ren Guo
    Yonghong Chen
    Quantum Information Processing, 2017, 16
  • [28] Breaking and fixing the Helsinki protocol using SMV
    Zhang, YQ
    Xiao, GZ
    ELECTRONICS LETTERS, 1999, 35 (15) : 1239 - 1240
  • [29] MODEL VERIFICATION AND IMPROVEMENT USING DISPROVER
    SIKLOSSY, L
    ROACH, J
    ARTIFICIAL INTELLIGENCE, 1975, 6 (01) : 41 - 52
  • [30] Modeling and verification of embedded systems using Cadence SMV
    Mir, AA
    Balakrishnan, S
    Tahar, S
    2000 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CONFERENCE PROCEEDINGS, VOLS 1 AND 2: NAVIGATING TO A NEW ERA, 2000, : 179 - 183