Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool

被引:0
|
作者
Asadi, Sepideh [1 ]
Shahhoseini, Hadi Shahriar [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Elect Engn, Tehran, Iran
来源
2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST) | 2012年
关键词
Formal Verification; SNMPv3; ProVerif; Applied pi-Calculus; Authentication; Correspondence Assertions;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, the verification of network management protocols has been the subject of many research works. SNMP (Simple Network Management Protocol) is a widely used protocol for monitoring and managing devices on IP networks. Three significant security features (authentication, encryption, access control) are added to SNMPv3 under the User-based Security Model (USM). Until now, no formal and automated verification methods have been proposed for network management protocols and they have been analyzed only with informal techniques or with symbolic methods which is a hard, time-consuming and error-prone task when done by hand. Hence, in this paper, we first describe the SNMPv3 protocol and propose an abstract model of it to formalize our understanding of SNMP, and provide a specification of SNMPv3 in the applied pi-calculus. We verify authenticity in SNMPv3 protocol without bounding the number of sessions of the protocol, using an automated protocol verifier, ProVerif and we show a proof of authenticity for the SNMPv3 protocol.
引用
收藏
页码:1060 / 1064
页数:5
相关论文
共 50 条
  • [41] Design and Security Analysis of Mobile Identity Authentication Protocol
    Wang Qin
    Zhi Fenhe
    Ao Jinghai
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2645 - 2649
  • [42] Formal analysis and verification of security for automated trust negotiation
    Liu, Xin-Xin
    Tang, Shao-Hua
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2013, 41 (01): : 77 - 82
  • [43] Formal modeling and security analysis method of security protocol based on CPN
    Gong X.
    Feng T.
    Du J.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (09): : 240 - 253
  • [44] FORMAL MODELING AND AUTOMATED-ANALYSIS OF THE LAPD PROTOCOL
    SHATZ, SM
    KAJKA, PS
    CHAUHAN, AS
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1990, 18 (04): : 293 - 314
  • [45] Formal Analysis of the Security Protocol with Timestamp Using SPIN
    Xiao, Meihua
    Song, Weiwei
    Yang, Ke
    OuYang, Ri
    Zhao, Hanyu
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [46] Protocol engineering applied to formal analysis of security systems
    Lopez, J
    Ortega, JJ
    Troya, JM
    INFRASTRUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 246 - 259
  • [47] An Improved Security Protocol Formal Analysis with BAN Logic
    Li Tingyuan
    Liu Xiaodong
    Qin Zhiguang
    Zhang Xuanfang
    ECBI: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMMERCE AND BUSINESS INTELLIGENCE, PROCEEDINGS, 2009, : 102 - +
  • [48] Automated Reasoning for Security Protocol Analysis -: Preface
    Degano, Pierpaolo
    Vigano, Luca
    THEORETICAL COMPUTER SCIENCE, 2006, 367 (1-2) : 1 - 1
  • [49] Formal integrated network security analysis tool: formal query-based network security configuration analysis
    Maity, Soumya
    Bera, P.
    Ghosh, Soumya K.
    Al-Shaer, Ehab
    IET NETWORKS, 2015, 4 (02) : 137 - 147
  • [50] Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool
    Feng, Tao
    Chen, Taining
    Gong, Xiang
    INFORMATION, 2024, 15 (02)