The study on the application of BAN logic in formal analysis of authentication protocols

被引:0
|
作者
Wen, Jinghua [1 ]
Zhang, Mei [1 ]
Li, Xiang [1 ]
机构
[1] Informat Inst GuiZhou Coll Finance & Ecno, Guiyang 550004, Peoples R China
关键词
authentication protocols; formalization analysis; BAN logic;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
The authentication protocol is the most fundamental and critical issue in network security and safety system and BAN logic is the most important tool to have a formalization analysis of authentication protocols. This paper first attempts to illustrate the basic methods for BAN logic analysis protocols by making a comparative study between two simplified cases, and then discusses the function of BAN logic in formalization analysis, finally exploring its limitation and methods for improvement.
引用
收藏
页码:744 / 747
页数:4
相关论文
共 50 条
  • [31] USE OF A FORMAL DESCRIPTION TECHNIQUE IN THE SPECIFICATION OF AUTHENTICATION PROTOCOLS
    VARADHARAJAN, V
    COMPUTER STANDARDS & INTERFACES, 1990, 9 (03) : 203 - 215
  • [32] Formal verification logic for hybrid security protocols
    Newe, T
    Coffey, T
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (01): : 17 - 25
  • [33] A logical verification method for security protocols based on linear logic and BAN logic
    Hasebe, K
    Okada, M
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 417 - 440
  • [34] Authentication Tests Based on Distributed Temporal Protocol Logic for the Analysis of Security Protocols
    Muhammad, Shahabuddin
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 214 - 228
  • [35] Security analysis and application of Chebyshev Chaotic map in the authentication protocols
    Dharminder D.
    Gupta P.
    Dharminder, Dharminder (manndharminder999@gmail.com), 1600, Taylor and Francis Ltd. (43): : 1095 - 1103
  • [36] Secure and Efficient WBAN Authentication Protocols for Intra-BAN Tier
    Almuhaideb, Abdullah M.
    Alghamdi, Huda A.
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2022, 11 (03)
  • [37] From informal knowledge to formal logic: A realistic case study in medical protocols
    Marcos, M
    Balser, M
    ten Teije, A
    van Harmelen, F
    KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT, PROCEEDINGS: ONTOLOGIES AND THE SEMANTIC WEB, 2002, 2473 : 49 - 64
  • [38] One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication
    Bicakci, K
    Baykal, N
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 794 - 801
  • [39] Communication space reduction for formal verification of secure authentication protocols
    Kim, K
    Abraham, JA
    THIRD INTERNATIONAL WORKSHOP ON ADVANCED ISSUES OF E-COMMERCE AND WEB-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2001, : 225 - 227
  • [40] A Formal Analysis of Authentication in the TPM
    Delaune, Stephanie
    Kremer, Steve
    Ryan, Mark D.
    Steel, Graham
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 111 - +