Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol

被引:4
作者
Feng, Tao [1 ]
Wu, Yi [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Gansu, Peoples R China
基金
中国国家自然科学基金;
关键词
Network protocols - Network security - Petri nets - Security systems;
D O I
10.1155/2022/8104884
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security analysis of security protocol can be used to ensure communication security in the network. The process of security protocol analysis using the formal analysis method is simple and standardized, which is a research hotspot in the field of information security. In this study, a formal analysis method based on colored Petri net theory and Dolev-Yao attacker model is adopted to analyze LonTalk authentication protocol, and three types of attackable vulnerabilities including replay, tamper, and spoofing are found in LonTalk authentication protocol; thus, a secure LonTalk-SA authentication protocol is proposed. The LonTalk-SA authentication protocol was added with a trusted third-party server, which authenticates the identity of the sender and receiver and generates session keys through XOR operations on random numbers. The formal analysis of the new scheme shows that the new scheme can effectively resist three types of attacks, provide bidirectional authentication of communication nodes, and ensure the confidentiality, integrity, and authentication of messages during transmission, thus improving the security of protocols.
引用
收藏
页数:19
相关论文
共 26 条
[1]  
Albany M, 2022, Proc. Comput. Sci., V201, P437
[2]  
Burke Jeff, 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), P394, DOI 10.1109/INFCOMW.2013.6970725
[3]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[4]  
Ganesan P, 2003, P 2 ACM INT C WIR SE, P151, DOI [10.1145/941350.941372, DOI 10.1145/941350.941372]
[5]  
Gong X., 2021, J. Commun, V42, P240
[6]  
Granzer W, 2010, LECT NOTES COMPUT SC, V6351, P303, DOI 10.1007/978-3-642-15651-9_23
[7]   Security of Building Automation and Control Systems: Survey and future research directions [J].
Graveto, Vitor ;
Cruz, Tiago ;
Simoes, Paulo .
COMPUTERS & SECURITY, 2022, 112
[8]   A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks [J].
Hakeem, Shimaa A. Abdel ;
Abd El-Kader, Sherine M. ;
Kim, HyungWon .
SENSORS, 2021, 21 (17)
[9]   Survey on smart homes: Vulnerabilities, risks, and countermeasures [J].
Hammi, Badis ;
Zeadally, Sherali ;
Khatoun, Rida ;
Nebhen, Jamel .
COMPUTERS & SECURITY, 2022, 117
[10]   Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems [J].
Jensen K. ;
Kristensen L.M. ;
Wells L. .
International Journal on Software Tools for Technology Transfer, 2007, 9 (3-4) :213-254