On BAN logics for industrial security protocols

被引:0
|
作者
Agray, N [1 ]
van der Hoek, W
de Vink, E
机构
[1] Univ Utrecht, Inst Informat & Comp Sci, Utrecht, Netherlands
[2] Univ Liverpool, Dept Comp Sci, Liverpool, Merseyside, England
[3] Tech Univ Eindhoven, Dept Comp Sci, NL-5600 MB Eindhoven, Netherlands
[4] Leiden Univ, Leiden Inst Adv Comp Sci, Leiden, Netherlands
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism is lacking, BAN logic provides an intuitive and powerful technique for security analysis.
引用
收藏
页码:29 / 36
页数:8
相关论文
共 50 条
  • [1] Challenges for Decidable Epistemic Logics from Security Protocols
    Ramanujam, R.
    Suresh, S. P.
    GAMES, NORMS AND REASONS: LOGIC AT THE CROSSROADS, 2011, 353 : 215 - 231
  • [2] Cyber Security of Industrial Communication Protocols
    Su, Weilian
    Antoniou, Anastasios
    Eagle, Chris
    2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2017,
  • [3] Using temporal logics of knowledge in the formal verification of security protocols
    Dixon, C
    Gago, MCF
    Fisher, M
    van der Hoek, W
    11TH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS, 2004, : 148 - 151
  • [4] Security and Forensic Analysis for Industrial Ethernet Protocols
    Yu, Geon
    Shon, Taeshik
    2022 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON22), 2022, : 63 - 65
  • [5] A logical verification method for security protocols based on linear logic and BAN logic
    Hasebe, K
    Okada, M
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 417 - 440
  • [6] SECURITY OF COMMUNICATION PROTOCOLS IN INDUSTRIAL CONTROL SYSTEMS (ICSS)
    Vlajic, Natalija
    Mirkovic, Jelena
    Noce, Robert
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (06) : 20 - 20
  • [7] An Improved and Efficient Tool for Analyzing Industrial Security Protocols
    Liu, Nan
    Zhu, Yuefei
    Mao, Zhongquan
    Xu, Wei
    2009 IITA INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS ENGINEERING, PROCEEDINGS, 2009, : 528 - 532
  • [8] The Study of Security Issues for the Industrial Control Systems Communication Protocols
    Qu Wanying
    Wei Weimin
    Zhu Surong
    Zhao Yan
    PROCEEDINGS OF THE 2015 JOINT INTERNATIONAL MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY CONFERENCE (JIMET 2015), 2015, 10 : 693 - 698
  • [9] Comparative analysis of the security of configuration protocols for industrial control devices
    Martin-Liras, Luis
    Prada, Miguel A.
    Fuertes, Juan J.
    Moran, Antonio
    Alonso, Serafin
    Dominguez, Manuel
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2017, 19 : 4 - 15
  • [10] Note on the augmentation of BAN-like logics
    Zheng, Dong
    Tian, Jianbo
    Wang, Yumin
    Dianzi Kexue Xuekan/Journal of Electronics, 2000, 22 (01): : 73 - 77