Formal Verification of PKMv3 Protocol Using DT-Spin

被引:4
作者
Zhu, Xiaoran [1 ]
Xu, Yuanmin [2 ]
Guo, Jian [1 ]
Wu, Xi [2 ]
Zhu, Huibiao [2 ]
Miao, Weikai [2 ]
机构
[1] East China Normal Univ, Soft Hardware Codesign Engn Res Ctr, Shanghai, Peoples R China
[2] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai, Peoples R China
来源
PROCEEDINGS 2015 INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING | 2015年
关键词
PKMv3; protocol; Discrete-time PROMELA; DT-Spin; modeling; verification;
D O I
10.1109/TASE.2015.20
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
WiMax (Worldwide Interoperability for Microwave Access, IEEE 802.16) is a standard-based wireless technology, which uses Privacy Key Management (PKM) protocol to provide authentication and key management. Three versions of PKM protocol have been released and the third version (PKMv3) strengthens the security by enhancing the message management. In this paper, a formal analysis of PKMv3 protocol is presented. Both the subscriber station (SS) and the base station (BS) are modeled as processes in our framework. Discrete time describes the lifetime of the Authorization Key (AK) and the Transmission Encryption Key (TEK), which are produced by BS. Moreover, the PKMv3 model is constructed through the discrete-time PROMELA (DT-PROMELA) language and the tool DT-Spin implements the PKMv3 model with lifetime. Finally, we simulate communications between SS and BS and some properties are verified, i.e. liveness, succession and message consistency, which are extracted from PKMv3 and specified using Linear Temporal Logic (LTL) formulae and assertions. Our model provides a basis for further verification of PKMv3 protocol with time characteristic.
引用
收藏
页码:71 / 78
页数:8
相关论文
共 11 条
[1]  
[Anonymous], 80216M IEEE
[2]  
ELAMIN AM, 2013, INT J COMPUTER SCI T, P41
[3]  
Kreiker J., 2011, Dagstuhl Manifestos, V1, P21
[4]  
NEUMANN R, 2014, ARCH FORMAL PROOFS, V2014
[5]  
Rai AK, 2011, COMM COM INF SC, V191, P407
[6]  
Raju KVK, 2010, COMM COM INF SC, V101, P590
[7]  
SAHA I, 2006, FORM METH APPL TECHN, P227
[8]  
SAHA I, 2007, COMP THEOR APPL 2007, P77
[9]  
Sen Xu, 2008, 2008 IEEE International Symposium on Wireless Communication Systems (ISWCS), P653, DOI 10.1109/ISWCS.2008.4726137
[10]  
Taha AM, 2009, FORMAL VERIFICATION, P1