Cargando…

Formal Analysis of the Security Protocol with Timestamp Using SPIN

The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensu...

Descripción completa

Detalles Bibliográficos
Autores principales: Xiao, Meihua, Song, Weiwei, Yang, Ke, OuYang, Ri, Zhao, Hanyu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9427237/
https://www.ncbi.nlm.nih.gov/pubmed/36052031
http://dx.doi.org/10.1155/2022/2420590
_version_ 1784778852871962624
author Xiao, Meihua
Song, Weiwei
Yang, Ke
OuYang, Ri
Zhao, Hanyu
author_facet Xiao, Meihua
Song, Weiwei
Yang, Ke
OuYang, Ri
Zhao, Hanyu
author_sort Xiao, Meihua
collection PubMed
description The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensure network security. However, previous formal analysis method of such protocols often extracted timestamps into random numbers in order to simplify the model before modeling and verification, which probably cause time-dependent security properties that are ignored. To solve this problem, a method for verifying security protocols with timestamps using model checking technique is proposed in this paper. To preserve the time-dependent properties of the protocol, Promela (process meta language) is utilized to define global clock representing the protocol system time, timer representing message transmission time, and the clock function representing the passage of time; in addition, a mechanism for checking timestamps in messages is built using Promela. To mitigate state space explosion in model checking, we propose a vulnerable channel priority method of using Promela to build intruder model. We take the famous WMF protocol as an example by modeling it with Promela and verifying it with model checker SPIN (Simple Promela Interpreter), and we have successfully found two attacks in the protocol. The results of our work can make some security schemes based on WMF protocol used in the Internet of things or other fields get security alerts. The results also show that our method is effective, and it can provide a direction for the analysis of other security protocols with timestamp in many fields.
format Online
Article
Text
id pubmed-9427237
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-94272372022-08-31 Formal Analysis of the Security Protocol with Timestamp Using SPIN Xiao, Meihua Song, Weiwei Yang, Ke OuYang, Ri Zhao, Hanyu Comput Intell Neurosci Research Article The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensure network security. However, previous formal analysis method of such protocols often extracted timestamps into random numbers in order to simplify the model before modeling and verification, which probably cause time-dependent security properties that are ignored. To solve this problem, a method for verifying security protocols with timestamps using model checking technique is proposed in this paper. To preserve the time-dependent properties of the protocol, Promela (process meta language) is utilized to define global clock representing the protocol system time, timer representing message transmission time, and the clock function representing the passage of time; in addition, a mechanism for checking timestamps in messages is built using Promela. To mitigate state space explosion in model checking, we propose a vulnerable channel priority method of using Promela to build intruder model. We take the famous WMF protocol as an example by modeling it with Promela and verifying it with model checker SPIN (Simple Promela Interpreter), and we have successfully found two attacks in the protocol. The results of our work can make some security schemes based on WMF protocol used in the Internet of things or other fields get security alerts. The results also show that our method is effective, and it can provide a direction for the analysis of other security protocols with timestamp in many fields. Hindawi 2022-08-23 /pmc/articles/PMC9427237/ /pubmed/36052031 http://dx.doi.org/10.1155/2022/2420590 Text en Copyright © 2022 Meihua Xiao et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Xiao, Meihua
Song, Weiwei
Yang, Ke
OuYang, Ri
Zhao, Hanyu
Formal Analysis of the Security Protocol with Timestamp Using SPIN
title Formal Analysis of the Security Protocol with Timestamp Using SPIN
title_full Formal Analysis of the Security Protocol with Timestamp Using SPIN
title_fullStr Formal Analysis of the Security Protocol with Timestamp Using SPIN
title_full_unstemmed Formal Analysis of the Security Protocol with Timestamp Using SPIN
title_short Formal Analysis of the Security Protocol with Timestamp Using SPIN
title_sort formal analysis of the security protocol with timestamp using spin
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9427237/
https://www.ncbi.nlm.nih.gov/pubmed/36052031
http://dx.doi.org/10.1155/2022/2420590
work_keys_str_mv AT xiaomeihua formalanalysisofthesecurityprotocolwithtimestampusingspin
AT songweiwei formalanalysisofthesecurityprotocolwithtimestampusingspin
AT yangke formalanalysisofthesecurityprotocolwithtimestampusingspin
AT ouyangri formalanalysisofthesecurityprotocolwithtimestampusingspin
AT zhaohanyu formalanalysisofthesecurityprotocolwithtimestampusingspin