The study on the application of BAN logic in formal analysis of authentication protocols

被引:0
|
作者
Wen, Jinghua [1 ]
Zhang, Mei [1 ]
Li, Xiang [1 ]
机构
[1] Informat Inst GuiZhou Coll Finance & Ecno, Guiyang 550004, Peoples R China
关键词
authentication protocols; formalization analysis; BAN logic;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
The authentication protocol is the most fundamental and critical issue in network security and safety system and BAN logic is the most important tool to have a formalization analysis of authentication protocols. This paper first attempts to illustrate the basic methods for BAN logic analysis protocols by making a comparative study between two simplified cases, and then discusses the function of BAN logic in formalization analysis, finally exploring its limitation and methods for improvement.
引用
收藏
页码:744 / 747
页数:4
相关论文
共 50 条
  • [1] Application of formal methods for analysis of authentication protocols
    Tiwari, RK
    DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 536 - 536
  • [2] Formal analysis of PUFs-based authentication protocols in logic of events theory
    Zhong X.
    Xiao M.
    Yang K.
    Luo Y.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2024, 52 (02): : 69 - 76
  • [3] ON THE FORMAL ANALYSIS OF PKCS AUTHENTICATION PROTOCOLS
    GAARDER, K
    SNEKKENES, E
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 106 - 121
  • [4] Formal verification of bundle authentication mechanism in OSGi service platform: BAN Logic
    Kim, YG
    Moon, CJ
    Jeong, DW
    Baik, DK
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2006, 16 (02) : 153 - 173
  • [5] Analysis of Authentication Protocols Based on Rubin Logic
    Xu, Yang
    Xie, Xiaoyao
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4680 - +
  • [6] An Improved Security Protocol Formal Analysis with BAN Logic
    Li Tingyuan
    Liu Xiaodong
    Qin Zhiguang
    Zhang Xuanfang
    ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 102 - +
  • [7] Formal Analysis of An Efficient Handover Authentication Scheme for EAP-based Wireless Networks with Extending BAN Logic
    Cao, Liling
    Ge, Wancheng
    FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY III, PTS 1-3, 2013, 401 : 1864 - 1867
  • [8] An extensive formal analysis of multi-factor authentication protocols
    Jacomme, Charlie
    Kremer, Steve
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 1 - 15
  • [9] An Extensive Formal Analysis of Multi-factor Authentication Protocols
    Jacomme, Charlie
    Kremer, Steve
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (02)
  • [10] Logic-based formal analysis of cryptographic protocols
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +