Journal on Communications ›› 2017, Vol. 38 ›› Issue (10): 175-188.doi: 10.11959/j.issn.1000-436x.2017208

• Correspondences • Previous Articles    

SSMCI:verification mechanism for security protocols centered on the attacker

Wen GU,Ji-hong HAN,Lin YUAN   

  1. The Third College,PLA Information Engineering University,Zhengzhou 450004,China
  • Revised:2017-06-06 Online:2017-10-01 Published:2017-11-16
  • Supported by:
    The National Natural Science Foundation of China(1309018)

Abstract:

A automatic verification mechanism for security protocols analysis was proposed.The attacker model was proposed and the concept of ‘need’ was defined,a knowledge set which was necessary for the attacker to compose a target message term but unknown to the attacker.The attacker model was established as needed.The mechanism centered on the attacker was designed,in which whether add a protocol session was determined by the attacker.This might cause contradiction in time sequence,so some back-track algorithm was adopted to solve this contradiction.Experiments show that the system can verify the security of the protocol,and the number of state space is slightly better than the Scyther tool.

Key words: security protocol, attacker model, state expansion

CLC Number: 

No Suggested Reading articles found!