The study on the application of BAN logic in formal analysis of authentication protocols

被引:0
|
作者
Wen, Jinghua [1 ]
Zhang, Mei [1 ]
Li, Xiang [1 ]
机构
[1] Informat Inst GuiZhou Coll Finance & Ecno, Guiyang 550004, Peoples R China
关键词
authentication protocols; formalization analysis; BAN logic;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
The authentication protocol is the most fundamental and critical issue in network security and safety system and BAN logic is the most important tool to have a formalization analysis of authentication protocols. This paper first attempts to illustrate the basic methods for BAN logic analysis protocols by making a comparative study between two simplified cases, and then discusses the function of BAN logic in formalization analysis, finally exploring its limitation and methods for improvement.
引用
收藏
页码:744 / 747
页数:4
相关论文
共 50 条
  • [41] Compositional analysis of authentication protocols
    Bugliesi, M
    Focardi, R
    Maffei, M
    PROGRAMMING LANGUAGES AND SYSTEMS, 2004, 2986 : 140 - 154
  • [42] A formal analysis of non-repudiation protocols based on first-order logic
    Yudan, Fan
    Jihong, Han
    Yadi, Wang
    Yu, Zhao
    Kai, Liao
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 6580 - 6583
  • [43] Study Of RFID Authentication Protocols
    Jadhao, A. G.
    Ugale, S. P.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [44] Extending BAN Logic for Reasoning with Modern PKI-based Protocols
    Sufatrio
    Yap, Roland H. C.
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 190 - +
  • [45] Formal analysis of meeting protocols
    Jonker, CM
    Schut, M
    Treur, J
    Yolum, P
    MULTI-AGENT AND MULTI-AGENT-BASED SIMULATION, 2005, 3415 : 114 - 129
  • [46] An encapsulated authentication logic for reasoning about key distribution protocols
    Cervesato, I
    Meadows, C
    Pavlovic, D
    18th IEEE Computer Security Foundations Workshop, Proceedings, 2005, : 48 - 61
  • [47] An authentication logic with formal semantics supporting synchronization, revocation, and recency
    Stubblebine, SG
    Wright, RN
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (03) : 256 - 285
  • [48] Hidden-ID authentication scheme and its SVO-Logic based formal analysis
    Jiang, Jin
    Li, Lei
    Huang, Zhihong
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 781 - +
  • [49] Where you are Based Authentication: An Improved Security Protocol Using BAN Logic
    Nabih, Abdelmajid
    Hossain, Alamgir
    Shepherd, Simon
    Khaled, Mahmoud
    PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 153 - 162
  • [50] APPLICATION OF FORMAL LOGIC TO PROGRAMS AND PROGRAMMING
    ALLEN, CD
    IBM SYSTEMS JOURNAL, 1971, 10 (01) : 2 - &