Cargando…
Formal Analysis of the Security Protocol with Timestamp Using SPIN
The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensu...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9427237/ https://www.ncbi.nlm.nih.gov/pubmed/36052031 http://dx.doi.org/10.1155/2022/2420590 |
_version_ | 1784778852871962624 |
---|---|
author | Xiao, Meihua Song, Weiwei Yang, Ke OuYang, Ri Zhao, Hanyu |
author_facet | Xiao, Meihua Song, Weiwei Yang, Ke OuYang, Ri Zhao, Hanyu |
author_sort | Xiao, Meihua |
collection | PubMed |
description | The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensure network security. However, previous formal analysis method of such protocols often extracted timestamps into random numbers in order to simplify the model before modeling and verification, which probably cause time-dependent security properties that are ignored. To solve this problem, a method for verifying security protocols with timestamps using model checking technique is proposed in this paper. To preserve the time-dependent properties of the protocol, Promela (process meta language) is utilized to define global clock representing the protocol system time, timer representing message transmission time, and the clock function representing the passage of time; in addition, a mechanism for checking timestamps in messages is built using Promela. To mitigate state space explosion in model checking, we propose a vulnerable channel priority method of using Promela to build intruder model. We take the famous WMF protocol as an example by modeling it with Promela and verifying it with model checker SPIN (Simple Promela Interpreter), and we have successfully found two attacks in the protocol. The results of our work can make some security schemes based on WMF protocol used in the Internet of things or other fields get security alerts. The results also show that our method is effective, and it can provide a direction for the analysis of other security protocols with timestamp in many fields. |
format | Online Article Text |
id | pubmed-9427237 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-94272372022-08-31 Formal Analysis of the Security Protocol with Timestamp Using SPIN Xiao, Meihua Song, Weiwei Yang, Ke OuYang, Ri Zhao, Hanyu Comput Intell Neurosci Research Article The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensure network security. However, previous formal analysis method of such protocols often extracted timestamps into random numbers in order to simplify the model before modeling and verification, which probably cause time-dependent security properties that are ignored. To solve this problem, a method for verifying security protocols with timestamps using model checking technique is proposed in this paper. To preserve the time-dependent properties of the protocol, Promela (process meta language) is utilized to define global clock representing the protocol system time, timer representing message transmission time, and the clock function representing the passage of time; in addition, a mechanism for checking timestamps in messages is built using Promela. To mitigate state space explosion in model checking, we propose a vulnerable channel priority method of using Promela to build intruder model. We take the famous WMF protocol as an example by modeling it with Promela and verifying it with model checker SPIN (Simple Promela Interpreter), and we have successfully found two attacks in the protocol. The results of our work can make some security schemes based on WMF protocol used in the Internet of things or other fields get security alerts. The results also show that our method is effective, and it can provide a direction for the analysis of other security protocols with timestamp in many fields. Hindawi 2022-08-23 /pmc/articles/PMC9427237/ /pubmed/36052031 http://dx.doi.org/10.1155/2022/2420590 Text en Copyright © 2022 Meihua Xiao et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Xiao, Meihua Song, Weiwei Yang, Ke OuYang, Ri Zhao, Hanyu Formal Analysis of the Security Protocol with Timestamp Using SPIN |
title | Formal Analysis of the Security Protocol with Timestamp Using SPIN |
title_full | Formal Analysis of the Security Protocol with Timestamp Using SPIN |
title_fullStr | Formal Analysis of the Security Protocol with Timestamp Using SPIN |
title_full_unstemmed | Formal Analysis of the Security Protocol with Timestamp Using SPIN |
title_short | Formal Analysis of the Security Protocol with Timestamp Using SPIN |
title_sort | formal analysis of the security protocol with timestamp using spin |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9427237/ https://www.ncbi.nlm.nih.gov/pubmed/36052031 http://dx.doi.org/10.1155/2022/2420590 |
work_keys_str_mv | AT xiaomeihua formalanalysisofthesecurityprotocolwithtimestampusingspin AT songweiwei formalanalysisofthesecurityprotocolwithtimestampusingspin AT yangke formalanalysisofthesecurityprotocolwithtimestampusingspin AT ouyangri formalanalysisofthesecurityprotocolwithtimestampusingspin AT zhaohanyu formalanalysisofthesecurityprotocolwithtimestampusingspin |