通信学报 ›› 2021, Vol. 42 ›› Issue (9): 240-253.doi: 10.11959/j.issn.1000-436x.2021175

• 学术通信 • 上一篇    

基于CPN的安全协议形式化建模及安全分析方法

龚翔, 冯涛, 杜谨泽   

  1. 兰州理工大学计算机与通信学院,甘肃 兰州 730050
  • 修回日期:2021-04-03 出版日期:2021-09-25 发布日期:2021-09-01
  • 作者简介:龚翔(1986− ),男,上海人,兰州理工大学博士生,主要研究方向为制造业信息化系统与网络安全、工业物联网协议安全的形式化验证等
    冯涛(1970− ),男,甘肃临洮人,博士,兰州理工大学研究员、博士生导师,主要研究方向为网络与信息安全、区块链和工业互联网等
    杜谨泽(1986− ),男,甘肃会宁人,博士,兰州理工大学讲师,主要研究方向为无线传感器网络、工业物联网、室内定位、网络安全等
  • 基金资助:
    国家自然科学基金资助项目(62162039);国家自然科学基金资助项目(61762060);甘肃省高等学校科研基金资助项目(2017C-05);甘肃省科技厅重点研发计划基金资助项目(20YF3GA016)

Formal modeling and security analysis method of security protocol based on CPN

Xiang GONG, Tao FENG, Jinze DU   

  1. School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China
  • Revised:2021-04-03 Online:2021-09-25 Published:2021-09-01
  • Supported by:
    The National Natural Science Foundation of China(62162039);The National Natural Science Foundation of China(61762060);Educational Commission of Gansu Province(2017C-05);Foundation for the Key Research and Development Program of Gansu Province(20YF3GA016)

摘要:

为了解决有色Petri网(CPN)对安全协议进行形式化建模分析时,仅能判断协议是否存在漏洞而无法找出漏洞具体位置和攻击路径的问题,以及 CPN 建模时随着攻击者模型引入,安全协议的形式化模型可能的消息路径数量激增,状态空间容易发生爆炸导致难以提取准确攻击路径的问题,改进了基于 CPN 的安全协议形式化建模方法,验证并提取攻击路径的同时,采用更细粒度的协议建模及控制。在状态空间收敛方面提出了 CPN 模型不同进程在各分层模型中等待-同步的方法控制状态空间规模。通过针对TMN协议的安全评估分析,成功提取出该协议25条攻击路径,评估了该协议安全性的同时证明了所述方法的有效性。

关键词: 有色Petri网, 安全协议, 形式化分析, 状态空间, 攻击路径

Abstract:

To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved.

Key words: colored Petri net, security protocol, formal analysis, state space, attack path

中图分类号: 

No Suggested Reading articles found!