期刊文献+

基于重写逻辑的PKMv3协议形式化建模与验证

FORMAL MODELING AND VERIFICATION OF PKMV3 PROTOCOL BASED ON REWRITING LOGIC
下载PDF
导出
摘要 IEEE802.16m标准在MAC安全子层定义了密钥管理PKMv3协议,用于认证和授权信息的传输以及密钥的交换。由于宽带无线网络具有易遭受攻击的特性,引入入侵者模型分析密钥管理协议的安全机制。利用一种基于重写逻辑的形式化建模语言Maude,实现对PKMv3网络环境中的通信主体以及系统状态的建模,并利用其自带的模型检测工具验证协议的安全特性。验证结果表明,PKMv3协议能保证密钥的机密性以及认证的可靠性,但仍有可能遭遇到中间人攻击破坏消息传输的完整性。 IEEE802.16m standard defines PKMv3 (Privacy and Key management) protocol in MAC security sub- layer to realize the transmission of authentication information and exchange of secret key. Because of the vulnerability of broadband wireless network, intruder model is introduced to analyze the security mechanism of this key management protocol. Using a formal modeling language Maude which based on rewriting logic, we achieved the modeling of communication agent and system state in PKMv3 network environment. And Maude utilized formal verification tools to verify the security feature of this protocol. Verification result showed that PKMv3 protocol can guarantee the confidentiality of secret key and the reliability of authentication. However, it also showed that the protocol cannot prevent Man-in-the-Middle attack and the integrity of message transmission may be destroyed.
作者 佘葭 张民
出处 《计算机应用与软件》 2017年第11期270-277,共8页 Computer Applications and Software
基金 国家自然科学基金青年基金项目(61502171)
关键词 IEEE802. 16m 标准 PKMv3 协议 密钥管理 重写逻辑 MAUDE 语言 形式化验证 IEEE 802.16m standard PKMv3 protocol Key management Rewriting logic Maude language Formal verification
  • 相关文献

参考文献2

二级参考文献22

  • 1S Sendall,W Kozaczynski.Model Transformation-the Heart and Soul of Model-Driven Software Development[J].IEEE Software,2003 ;20(5) :42-45. 被引量:1
  • 2Gardner T,Griffin C,Koehler et al.A review of OMG MOF 2.0 Query/Views/Transformations Submissions and Recommendations Towards the Final Standard[S].OMG,iBM,2003. 被引量:1
  • 3Manuel Clavel,Francisco Durán,Steven Eker et al.Maude:specification and programming in rewriting logic[J].Theoretical Computer Science,2002;285(2) : 187-243. 被引量:1
  • 4Dirk Riehle,Steven Fraleigh,Dirk Bucka-Lassen et al.The Architecture of a Uml Virtual Machine[C].ln:Proc of 2001 Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA'01 )[M].ACM Press,2001:327-341. 被引量:1
  • 5C Chambers.Object-Oriented Multi-Methods in Cecil[C].In:Proc of the European Conference on Object-Oriented Programming(ECOOP'92), Springer-Verlag, 1992 : 33-56. 被引量:1
  • 6屈延文.形式语义学基础与形式说明[M].北京:科学出版社,1998.1-8. 被引量:3
  • 7IEEE Std 802,16e- Standard for Local and metropolitan area networks Part 16: Air lnterface for Fixed and Mobile Broadband Wireless Access Systems[S]. 2005. 被引量:1
  • 8A.Fuetal. "EKMP: Ala Enhanced Key Managenlcnt Protocol for IEEE802.16m'" , Proc.WCNC' 2011. pp, March, 2011. 1872-1877. 被引量:1
  • 9DouglassR.Stinson著,冯登国译,密码学原理与实践(第二版),北京:电子工业出版礼,2003. 被引量:1
  • 10A. Fu et al., "A Fast Handover Authentication Mechanism Based on Ticket for IEEE 802.16m" , IEEE Communications Letters, vol. 14, no. 12, pp. 1134 1136,December, 2010. 被引量:1

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部