Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool

被引:0
|
作者
Asadi, Sepideh [1 ]
Shahhoseini, Hadi Shahriar [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Elect Engn, Tehran, Iran
来源
2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST) | 2012年
关键词
Formal Verification; SNMPv3; ProVerif; Applied pi-Calculus; Authentication; Correspondence Assertions;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, the verification of network management protocols has been the subject of many research works. SNMP (Simple Network Management Protocol) is a widely used protocol for monitoring and managing devices on IP networks. Three significant security features (authentication, encryption, access control) are added to SNMPv3 under the User-based Security Model (USM). Until now, no formal and automated verification methods have been proposed for network management protocols and they have been analyzed only with informal techniques or with symbolic methods which is a hard, time-consuming and error-prone task when done by hand. Hence, in this paper, we first describe the SNMPv3 protocol and propose an abstract model of it to formalize our understanding of SNMP, and provide a specification of SNMPv3 in the applied pi-calculus. We verify authenticity in SNMPv3 protocol without bounding the number of sessions of the protocol, using an automated protocol verifier, ProVerif and we show a proof of authenticity for the SNMPv3 protocol.
引用
收藏
页码:1060 / 1064
页数:5
相关论文
共 50 条
  • [31] Formal Analysis and Verification for an Ultralightweight Authentication Protocol RAPP of RFID
    Li, Wei
    Xiao, Meihua
    Li, Yanan
    Mei, Yingtian
    Zhong, Xiaomei
    Tu, Jimin
    THEORETICAL COMPUTER SCIENCE, NCTCS 2017, 2017, 768 : 119 - 132
  • [32] Formal Analysis of A Novel Mutual Authentication and Key Agreement Protocol
    AL-Saraireh, Ja'afer M.
    Saraireh, Mohammad S.
    Saraireh, Saleh S.
    Al Nabhan, Mohammad M.
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2011, 11 (02): : 86 - 92
  • [33] Design and Formal Analysis of an Authentication Protocol, eWMDP on Wearable Devices
    Lu, Bo
    Cao, Ruohan
    Lu, Yueming
    Luo, Xueting
    IEEE ACCESS, 2019, 7 : 97771 - 97783
  • [34] Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
    Yang, Huihui
    Prinz, Andreas
    Oleshchuk, Vladmir
    2016 24TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP), 2016, : 553 - 557
  • [35] Formal Analysis of Authentication Protocol Based on Directed Graph Model
    Li, Changchun
    Wang, Kangnian
    Zhu, Xingtao
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 829 - 835
  • [36] Formal analysis of robust email protocol based on authentication tests
    Jiang, Rui
    Hu, Aiqun
    Journal of Southeast University (English Edition), 2009, 25 (02) : 147 - 151
  • [37] Security and performance analysis of the SEAP authentication protocol in MANETs
    Maity, Soumyadev
    Hansdah, R. C.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2017, 24 (03) : 183 - 203
  • [38] Security Analysis of a Mutual Authentication Protocol for RFID Systems
    Yang, Yuanyuan
    Lu, Zhen
    Chen, Zhuo
    Wei, Xiang
    Gu, Jian
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 252 - 255
  • [39] A RFID Mutual Authentication Security Protocol Design and Analysis
    Liang, Xiaobing
    Lv, Yingjie
    Zhao, Bing
    Liu, Ying
    Sun, Zhiqiang
    Cen, Wei
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 508 - 512
  • [40] Security Analysis of WAPI Access Authentication Protocol WAI
    Zhang Ruihong
    Yang Wei
    INNOVATIVE COMPUTING AND INFORMATION, PT II, 2011, 232 : 253 - 258