Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol

被引:4
|
作者
Feng, Tao [1 ]
Wu, Yi [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Gansu, Peoples R China
基金
中国国家自然科学基金;
关键词
Network protocols - Network security - Petri nets - Security systems;
D O I
10.1155/2022/8104884
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security analysis of security protocol can be used to ensure communication security in the network. The process of security protocol analysis using the formal analysis method is simple and standardized, which is a research hotspot in the field of information security. In this study, a formal analysis method based on colored Petri net theory and Dolev-Yao attacker model is adopted to analyze LonTalk authentication protocol, and three types of attackable vulnerabilities including replay, tamper, and spoofing are found in LonTalk authentication protocol; thus, a secure LonTalk-SA authentication protocol is proposed. The LonTalk-SA authentication protocol was added with a trusted third-party server, which authenticates the identity of the sender and receiver and generates session keys through XOR operations on random numbers. The formal analysis of the new scheme shows that the new scheme can effectively resist three types of attacks, provide bidirectional authentication of communication nodes, and ensure the confidentiality, integrity, and authentication of messages during transmission, thus improving the security of protocols.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] An improvement of authentication test for security protocol analysis
    Li, Xiangdong
    Wang, Qingxian
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 745 - 748
  • [2] Security analysis and improvement of the efficient password-based authentication protocol
    Kwon, T
    Park, YH
    Lee, HJ
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (01) : 93 - 95
  • [3] An Improvement RFID Security Authentication Protocol Based on Hash Function
    Sun, Haowen
    Li, Peng
    Xu, He
    Zhu, Feng
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 375 - 384
  • [4] Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool
    Asadi, Sepideh
    Shahhoseini, Hadi Shahriar
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1060 - 1064
  • [5] Security analysis and improvement of a user-friendly remote authentication protocol
    Wang, YJ
    Li, JH
    Tie, L
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 47 - 50
  • [6] Formal Analysis of Authentication Protocol Based on Directed Graph Model
    Li, Changchun
    Wang, Kangnian
    Zhu, Xingtao
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 829 - 835
  • [7] Formal analysis of robust email protocol based on authentication tests
    Jiang, Rui
    Hu, Aiqun
    Journal of Southeast University (English Edition), 2009, 25 (02) : 147 - 151
  • [8] Formal Security Analysis and Improvement of a Hash-Based NFC M-Coupon Protocol
    Alshehri, Ali
    Schneider, Steve
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 : 152 - 167
  • [9] A New Model of Formal Design System of Security Authentication Protocol
    Wang Hui-bin
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 549 - 552
  • [10] Formal modeling and security analysis method of security protocol based on CPN
    Gong X.
    Feng T.
    Du J.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253