Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool

被引:0
|
作者
Asadi, Sepideh [1 ]
Shahhoseini, Hadi Shahriar [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Elect Engn, Tehran, Iran
来源
2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST) | 2012年
关键词
Formal Verification; SNMPv3; ProVerif; Applied pi-Calculus; Authentication; Correspondence Assertions;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, the verification of network management protocols has been the subject of many research works. SNMP (Simple Network Management Protocol) is a widely used protocol for monitoring and managing devices on IP networks. Three significant security features (authentication, encryption, access control) are added to SNMPv3 under the User-based Security Model (USM). Until now, no formal and automated verification methods have been proposed for network management protocols and they have been analyzed only with informal techniques or with symbolic methods which is a hard, time-consuming and error-prone task when done by hand. Hence, in this paper, we first describe the SNMPv3 protocol and propose an abstract model of it to formalize our understanding of SNMP, and provide a specification of SNMPv3 in the applied pi-calculus. We verify authenticity in SNMPv3 protocol without bounding the number of sessions of the protocol, using an automated protocol verifier, ProVerif and we show a proof of authenticity for the SNMPv3 protocol.
引用
收藏
页码:1060 / 1064
页数:5
相关论文
共 50 条
  • [1] Security performance analysis of SNMPv3 with respect to SNMPv2c
    Corrente, A
    Tura, L
    NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 729 - 742
  • [2] Automated Formal Analysis of NetConf Protocol for Authentication Properties
    Izadi, Farnaz
    Shahhoseini, Hadi Shahriar
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1055 - 1059
  • [3] Research and Application of SNMPv3 Security Mechanism In Electricity Network Management System
    Hou, Yingying
    Wang, Wenzhen
    Wang, Botao
    ADVANCES IN POWER AND ELECTRICAL ENGINEERING, PTS 1 AND 2, 2013, 614-615 : 1979 - 1984
  • [4] Formal Security Analysis and Improvement Based on LonTalk Authentication Protocol
    Feng, Tao
    Wu, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] Automated Security Protocol Analysis With the AVISPA Tool
    Vigano, Luca
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 155 : 61 - 86
  • [6] Performance evaluation and scalability analysis of SNMPv3 with superimposition in a mobile environment
    Duarte, FDP
    Loureiro, AAF
    CONCURRENT ENGINEERING-RESEARCH AND APPLICATIONS, 2001, 9 (02): : 139 - 145
  • [7] A policy-based security management architecture using XML encryption mechanism for improving SNMPv3
    Hong, CS
    Heo, J
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 755 - 764
  • [8] A New Model of Formal Design System of Security Authentication Protocol
    Wang Hui-bin
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 549 - 552
  • [9] A new authentication protocol and its formal analysis
    Wen, Jinghua
    Zhang, Mei
    Li, Xiang
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (08): : 159 - 161
  • [10] Formal Analysis of PANA Authentication and Authorisation Protocol
    Gordon, Steven
    PDCAT 2008: NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2008, : 277 - 284