A modified method for analyzing authentication protocol security using Colored Petri Nets

被引:0
作者
Shen, Jiajun [1 ]
Feng, Dongqin [1 ]
Chu, Jian [1 ]
机构
[1] State Key Laboratory of Industrial Control Technology, Institute of Cyber-Systems and Control, Zhejiang University
来源
Journal of Computational Information Systems | 2014年 / 10卷 / 10期
关键词
Authentication protocol; Colored Petri Nets; Helsinki protocol; Security analysis;
D O I
10.12733/jcis10274
中图分类号
学科分类号
摘要
The security problems of authentication protocol have been increasingly recognized. However, it is difficult to design an effective and secure authentication protocol for industrial networks, which is not only because of the characteristics of industrial networks, but also due to the lack of proper analysis techniques. In this paper, a modified method for analyzing authentication protocol security using Colored Petri Nets (CP-Nets) is presented. Especially, in this modified method, CPN tools is used for the construction and the analysis of CP-Nets model. The modified method is applied in the analysis of the Helsinki protocol. An attack, which is the same as the one found by G. Horng and C. K. Hsu, is found after the model checking. The result proves the availability of the modified method. 1553-9105/Copyright © 2014 Binary Information Press.
引用
收藏
页码:4233 / 4243
页数:10
相关论文
共 26 条
[1]  
Bicakci K., Baykal N., One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication, Lecture Notes in Computer Science, 2869, pp. 794-801, (2003)
[2]  
Uyay M.U., Fecko M.A., Sethi A.S., Amer P.D., Testing protocols modeled as FSMs with timing parameters, Computer Networks, 31, pp. 1967-1988, (1999)
[3]  
Lee D., Sabnani K.K., Kristol D.M., Paul S., Conformance testing of protocols specified as communicating FSMs, INFOCOM '93, 31, 18, (1999)
[4]  
Murata T., Petri nets: Properties, analysis, and applications, Proceedings of IEEE, 77, 4, (1989)
[5]  
Petri C.A., Communication with automata, New York: Griffiss Air Force Base, 1, SUPPL.1, (1966)
[6]  
Peterson J.L., Petri net theory and the modeling of systems, Prentice-Hall International, (1981)
[7]  
Ortiz E.L., Canonical polynomials in the Lanczos tau-method, Studies in Numerical Analysis, pp. 73-93, (1974)
[8]  
Guo Y.B., Xi J.Q., Tang D.Y., Li X.M., Flexible transactional process model via CPN, Journal of Computational Information Systems, 4, pp. 725-730, (2008)
[9]  
King A., Lu L.-J., A backward analysis for constraint logic programs, Theory and Practice of Logic Programming, 2, 4-5, pp. 517-547, (2002)
[10]  
CPN tools homepage