CORC  > 兰州理工大学  > 兰州理工大学  > 计算机与通信学院
Formal modeling and security analysis method of security protocol based on CPN
Gong, Xiang; Feng, Tao; Du, Jinze
刊名Tongxin Xuebao/Journal on Communications
2021-09-25
卷号42期号:9页码:240-253
关键词Analysis method Attack path Colored Petri Nets Formal analysis Formal modeling Formal security Modeling analyzes Security analysis Security protocols State-space
ISSN号1000436X
DOI10.11959/j.issn.1000-436x.2021175
英文摘要To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn't identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted. As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model. Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved. © 2021, Editorial Board of Journal on Communications. All right reserved.
语种中文
出版者Editorial Board of Journal on Communications
内容类型期刊论文
源URL[http://ir.lut.edu.cn/handle/2XXMBERH/150775]  
专题计算机与通信学院
作者单位School of Computer and Communication, Lanzhou University of Technology, Lanzhou; 730050, China
推荐引用方式
GB/T 7714
Gong, Xiang,Feng, Tao,Du, Jinze. Formal modeling and security analysis method of security protocol based on CPN[J]. Tongxin Xuebao/Journal on Communications,2021,42(9):240-253.
APA Gong, Xiang,Feng, Tao,&Du, Jinze.(2021).Formal modeling and security analysis method of security protocol based on CPN.Tongxin Xuebao/Journal on Communications,42(9),240-253.
MLA Gong, Xiang,et al."Formal modeling and security analysis method of security protocol based on CPN".Tongxin Xuebao/Journal on Communications 42.9(2021):240-253.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace