Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther

被引:0
|
作者
Pradeep, R. [1 ]
Sunitha, N. R. [1 ]
Ravi, V [1 ]
Verma, Sushma [2 ]
机构
[1] Siddaganga Inst Technol, Dept CSE, Tumkur, Karnataka, India
[2] Def Res & Dev Org, SAG, New Delhi, India
关键词
Formal Verification; Security Protocols; Model-Checking; Scyther; TACACS; AAA; Confidentiality; Authentication;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Designing a perfect security protocol is a difficult task and requires a good effort and knowledge of Cryptography which is an art of secret writing. In order to achieve high reliability of security protocols, the testing technique is not suitable, because the testing technique has got many drawbacks. To achieve high reliability of security protocols, proving the correctness of security protocols is very much essential. To prove and verify the correctness of security protocols the Formal Verification technique is the best solution because it provides the mathematical proof for the correctness of security protocols. TACACS+ (Terminal Access Controller Access-Control System Plus) [6] is one the important security protocol used by most of the Cisco network communication devices to provide Authentication, Authorization, and Accountability (popularly known as AAA services) services to the host devices. In the proposed work, the TACACS+ security protocol is formally verified using the Model Checking technique. Using the Scyther [12] model checker the Confidentiality and Authentication security properties of TACACS+ security protocol is successfully verified.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Formal verification of security model using SPR tool
    Kim, Il-Gon
    Kang, Miyoung
    Choi, Jin-Young
    Zegzhda, Peter D.
    Kalinin, Maxim O.
    Zegzhda, Dmitry P.
    Kang, Inhye
    COMPUTING AND INFORMATICS, 2006, 25 (05) : 353 - 368
  • [32] Formal Verification and Analysis of Primary Authentication based on 5G-AKA Protocol
    Edris, Ed Kamya Kiyemba
    Aiash, Mandi
    Loo, Jonathan Kok-Keng
    2020 SEVENTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2020, : 256 - 261
  • [33] Formal Verification of IEEE802.11i WPA-GPG Authentication Protocol
    Raju, K. V. Krishnam
    Kumari, V. Valli
    INFORMATION TECHNOLOGY AND MOBILE COMMUNICATION, 2011, 147 : 267 - +
  • [34] Analysis of LEACH Protocol(s) using Formal Verification
    Ihsan, A.
    Saghar, K.
    Fatima, T.
    2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 254 - 262
  • [35] Formal Verification of the Pastry Protocol Using TLA+
    Lu, Tianxiang
    DEPENDABLE SOFTWARE ENGINEERING: THEORIES, TOOLS, AND APPLICATIONS, SETTA 2015, 2015, 9409 : 284 - 299
  • [36] Formal verification of communication protocol using type theory
    Zhang, XY
    Xie, XR
    Munro, M
    Harman, M
    Hu, L
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 1585 - 1593
  • [37] Mutual Authentication Protocol for RFID Security using NFSR
    Suresh, T.
    Ramakrishnan, M.
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 255 - 259
  • [38] Formal modeling and verification of high-availability protocol for network security appliances
    Kim, Moonzoo
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2007, 4762 : 489 - 500
  • [39] Formal Analysis of the Security Protocol with Timestamp Using SPIN
    Xiao, Meihua
    Song, Weiwei
    Yang, Ke
    OuYang, Ri
    Zhao, Hanyu
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [40] Design of an Enhanced Authentication Protocol and Its Verification using AVISPA
    Amin, Ruhul
    Islam, S. K. Hafizul
    Karati, Arijit
    Biswas, G. P.
    2016 3RD INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN INFORMATION TECHNOLOGY (RAIT), 2016, : 404 - 409