Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther

被引:0
|
作者
Pradeep, R. [1 ]
Sunitha, N. R. [1 ]
Ravi, V [1 ]
Verma, Sushma [2 ]
机构
[1] Siddaganga Inst Technol, Dept CSE, Tumkur, Karnataka, India
[2] Def Res & Dev Org, SAG, New Delhi, India
关键词
Formal Verification; Security Protocols; Model-Checking; Scyther; TACACS; AAA; Confidentiality; Authentication;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Designing a perfect security protocol is a difficult task and requires a good effort and knowledge of Cryptography which is an art of secret writing. In order to achieve high reliability of security protocols, the testing technique is not suitable, because the testing technique has got many drawbacks. To achieve high reliability of security protocols, proving the correctness of security protocols is very much essential. To prove and verify the correctness of security protocols the Formal Verification technique is the best solution because it provides the mathematical proof for the correctness of security protocols. TACACS+ (Terminal Access Controller Access-Control System Plus) [6] is one the important security protocol used by most of the Cisco network communication devices to provide Authentication, Authorization, and Accountability (popularly known as AAA services) services to the host devices. In the proposed work, the TACACS+ security protocol is formally verified using the Model Checking technique. Using the Scyther [12] model checker the Confidentiality and Authentication security properties of TACACS+ security protocol is successfully verified.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther
    Mohammad, Zeyad
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (09)
  • [2] Formal Verification of IEEE 802.16 Security Sublayer Using Scyther Tool
    Taha, Ahmed M.
    Abdel-Hamid, Amr T.
    Tahar, Sofiene
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 172 - +
  • [3] Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther
    Yang, Huihui
    Prinz, Andreas
    Oleshchuk, Vladmir
    2016 24TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP), 2016, : 553 - 557
  • [4] Formal Analysis of OTag Protocol on Authentication and Confidentiality
    Koralalage, Krishan Sabaragamu
    Yoshiura, Noriaki
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 224 - 229
  • [5] Formal Analysis of the Signal Protocol using the Scyther Tool
    Almuzaini, Nawal Zaied
    Ahmad, Iftikhar
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [6] A Formal Description and Verification of Authentication Protocol
    Yuan, Zhanting
    Kang, Xu
    Zhang, Qiuyu
    Liang, Shuang
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 735 - 740
  • [7] Formal verification of security properties of the Lightweight Authentication and Key Exchange Protocol for Federated IoT devices
    Jarosz, Michal
    Wrona, Konrad
    Zielinski, Zbigniew
    PROCEEDINGS OF THE 2022 17TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS), 2022, : 617 - 625
  • [8] Design and Formal Verification of a VANET Lightweight Authentication Protocol
    Zhao, Guolei
    Wang, Ruinyun
    Wang, Xuejian
    Zhu, Xianwei
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 513 - 517
  • [9] An Improved Secure Authentication Protocol for WiMAX with Formal Verification
    Rai, Anjani Kumar
    Mishra, Shivendu
    Tripathi, Pramod Narayan
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 407 - +
  • [10] Towards a formal verification of an authentication protocol using non-monotonic logic
    Das, Manik Lal
    Narasimhan, V. Lakshmi
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 545 - 550