• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

使用 SPIN 对带时间戳的安全协议进行形式化分析。

Formal Analysis of the Security Protocol with Timestamp Using SPIN.

机构信息

School of Software, East China Jiaotong University, Nanchang 330013, China.

出版信息

Comput Intell Neurosci. 2022 Aug 23;2022:2420590. doi: 10.1155/2022/2420590. eCollection 2022.

DOI:10.1155/2022/2420590
PMID:36052031
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9427237/
Abstract

The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensure network security. However, previous formal analysis method of such protocols often extracted timestamps into random numbers in order to simplify the model before modeling and verification, which probably cause time-dependent security properties that are ignored. To solve this problem, a method for verifying security protocols with timestamps using model checking technique is proposed in this paper. To preserve the time-dependent properties of the protocol, Promela (process meta language) is utilized to define global clock representing the protocol system time, timer representing message transmission time, and the clock function representing the passage of time; in addition, a mechanism for checking timestamps in messages is built using Promela. To mitigate state space explosion in model checking, we propose a vulnerable channel priority method of using Promela to build intruder model. We take the famous WMF protocol as an example by modeling it with Promela and verifying it with model checker SPIN (Simple Promela Interpreter), and we have successfully found two attacks in the protocol. The results of our work can make some security schemes based on WMF protocol used in the Internet of things or other fields get security alerts. The results also show that our method is effective, and it can provide a direction for the analysis of other security protocols with timestamp in many fields.

摘要

安全协议的验证是网络安全的重要基础。现在,一些安全协议会向消息中添加时间戳,以防止网络入侵者的重播攻击。因此,验证具有时间戳的协议的安全属性对于确保网络安全具有重要意义。然而,以前针对此类协议的正式分析方法通常会将时间戳提取为随机数,以便在建模和验证之前简化模型,这可能会忽略与时间相关的安全属性。为了解决这个问题,本文提出了一种使用模型检查技术验证带时间戳的安全协议的方法。为了保留协议的时间相关属性,使用 Promela(进程元语言)定义表示协议系统时间的全局时钟、表示消息传输时间的计时器以及表示时间流逝的时钟函数;此外,使用 Promela 构建了检查消息中时间戳的机制。为了缓解模型检查中的状态空间爆炸问题,我们提出了一种使用 Promela 构建入侵模型的脆弱通道优先级方法。我们使用 Promela 对著名的 WMF 协议进行建模,并使用模型检查器 SPIN(Simple Promela Interpreter)对其进行验证,成功地在协议中发现了两个攻击。我们工作的结果可以使基于 WMF 协议的一些安全方案在物联网或其他领域得到安全警报。结果还表明,我们的方法是有效的,它可以为许多领域中带有时间戳的其他安全协议的分析提供方向。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/da7f078f8165/CIN2022-2420590.012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/6ec886c85717/CIN2022-2420590.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/247a61a7f3e0/CIN2022-2420590.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/e8df2ddf8936/CIN2022-2420590.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/ba92e2e3dc69/CIN2022-2420590.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/31f7bb65d7b3/CIN2022-2420590.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/3567f66dd679/CIN2022-2420590.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/743e2f15cbc4/CIN2022-2420590.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/6d3120e5dcda/CIN2022-2420590.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/a4a10ed989c4/CIN2022-2420590.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/b60def974502/CIN2022-2420590.010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/adaecf025925/CIN2022-2420590.011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/da7f078f8165/CIN2022-2420590.012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/6ec886c85717/CIN2022-2420590.001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/247a61a7f3e0/CIN2022-2420590.002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/e8df2ddf8936/CIN2022-2420590.003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/ba92e2e3dc69/CIN2022-2420590.004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/31f7bb65d7b3/CIN2022-2420590.005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/3567f66dd679/CIN2022-2420590.006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/743e2f15cbc4/CIN2022-2420590.007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/6d3120e5dcda/CIN2022-2420590.008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/a4a10ed989c4/CIN2022-2420590.009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/b60def974502/CIN2022-2420590.010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/adaecf025925/CIN2022-2420590.011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/1aab/9427237/da7f078f8165/CIN2022-2420590.012.jpg

相似文献

1
Formal Analysis of the Security Protocol with Timestamp Using SPIN.使用 SPIN 对带时间戳的安全协议进行形式化分析。
Comput Intell Neurosci. 2022 Aug 23;2022:2420590. doi: 10.1155/2022/2420590. eCollection 2022.
2
A formal analysis method for composition protocol based on model checking.基于模型检查的组合协议形式化分析方法。
Sci Rep. 2022 May 19;12(1):8493. doi: 10.1038/s41598-022-12448-2.
3
Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications.车载通信中无线传感器网络的安全认证协议。
Sensors (Basel). 2018 Sep 21;18(10):3191. doi: 10.3390/s18103191.
4
rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things.rTLS:面向物联网的安全高效 TLS 会话恢复。
Sensors (Basel). 2021 Sep 29;21(19):6524. doi: 10.3390/s21196524.
5
Security Analysis and Improvement of Vehicle Ethernet SOME/IP Protocol.车辆以太网SOME/IP协议的安全性分析与改进
Sensors (Basel). 2022 Sep 8;22(18):6792. doi: 10.3390/s22186792.
6
SAT and SMT-Based Verification of Security Protocols Including Time Aspects.基于 SAT 和 SMT 的包含时间方面的安全协议验证。
Sensors (Basel). 2021 Apr 27;21(9):3055. doi: 10.3390/s21093055.
7
IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT Devices.IMSC-EIoTD:边缘物联网设备的身份管理与安全通信
Sensors (Basel). 2020 Nov 16;20(22):6546. doi: 10.3390/s20226546.
8
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.多通道安全认证协议在无线网络中的应用。
J Med Syst. 2016 Jan;40(1):26. doi: 10.1007/s10916-015-0360-x. Epub 2015 Nov 7.
9
Modeling of a Generic Edge Computing Application Design.通用边缘计算应用设计建模。
Sensors (Basel). 2021 Nov 1;21(21):7276. doi: 10.3390/s21217276.
10
Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols.正式的安全验证真的可以选择吗?对 IMD 身份验证协议安全性的审查。
Sensors (Basel). 2021 Dec 15;21(24):8383. doi: 10.3390/s21248383.

引用本文的文献

1
Intelligent cell images segmentation system: based on SDN and moving transformer.智能细胞图像分割系统:基于 SDN 和移动Transformer。
Sci Rep. 2024 Oct 22;14(1):24834. doi: 10.1038/s41598-024-76577-6.