Journal on Communications ›› 2021, Vol. 42 ›› Issue (9): 240-253.doi: 10.11959/j.issn.1000-436x.2021175

• Correspondences • Previous Articles    

Formal modeling and security analysis method of security protocol based on CPN

Xiang GONG, Tao FENG, Jinze DU   

  1. School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China
  • Revised:2021-04-03 Online:2021-09-25 Published:2021-09-01
  • Supported by:
    The National Natural Science Foundation of China(62162039);The National Natural Science Foundation of China(61762060);Educational Commission of Gansu Province(2017C-05);Foundation for the Key Research and Development Program of Gansu Province(20YF3GA016)

Abstract:

To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved.

Key words: colored Petri net, security protocol, formal analysis, state space, attack path

CLC Number: 

No Suggested Reading articles found!