Formal Verification of Authentication and Confidentiality for TACACS plus Security Protocol using Scyther

被引:0
|
作者
Pradeep, R. [1 ]
Sunitha, N. R. [1 ]
Ravi, V [1 ]
Verma, Sushma [2 ]
机构
[1] Siddaganga Inst Technol, Dept CSE, Tumkur, Karnataka, India
[2] Def Res & Dev Org, SAG, New Delhi, India
关键词
Formal Verification; Security Protocols; Model-Checking; Scyther; TACACS; AAA; Confidentiality; Authentication;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Designing a perfect security protocol is a difficult task and requires a good effort and knowledge of Cryptography which is an art of secret writing. In order to achieve high reliability of security protocols, the testing technique is not suitable, because the testing technique has got many drawbacks. To achieve high reliability of security protocols, proving the correctness of security protocols is very much essential. To prove and verify the correctness of security protocols the Formal Verification technique is the best solution because it provides the mathematical proof for the correctness of security protocols. TACACS+ (Terminal Access Controller Access-Control System Plus) [6] is one the important security protocol used by most of the Cisco network communication devices to provide Authentication, Authorization, and Accountability (popularly known as AAA services) services to the host devices. In the proposed work, the TACACS+ security protocol is formally verified using the Model Checking technique. Using the Scyther [12] model checker the Confidentiality and Authentication security properties of TACACS+ security protocol is successfully verified.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Formal specification and verification of resource bound security using PVS
    Yu, WJ
    Mok, AK
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 113 - 133
  • [42] Formal verification and security analysis of FastDFS using process algebra
    Hou, Zhiru
    Zhu, Huibiao
    INTERNET OF THINGS, 2025, 31
  • [43] Using temporal logics of knowledge in the formal verification of security protocols
    Dixon, C
    Gago, MCF
    Fisher, M
    van der Hoek, W
    11TH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS, 2004, : 148 - 151
  • [44] Formal verification of a group membership protocol using model checking
    Rosset, Valerio
    Souto, Pedro F.
    Vasques, Francisco
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPLS, DOA, ODBASE, GADA, AND IS, PT 1, PROCEEDINGS, 2007, 4803 : 471 - 488
  • [45] Improvement of a Service Level Negotiation Protocol using Formal Verification
    Chalouf, Mohamed Aymen
    Krief, Francine
    Mbarek, Nader
    Lemlouma, Tayeb
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [46] Formal Specification and Verification of CSMA/CD Protocol Using Z
    Shukur, Zarina
    Alias, Nursyahidah
    Idrus, Bahari
    Halip, Mohd Hazali Mohamed
    JURNAL KEJURUTERAAN, 2009, 21 : 85 - 96
  • [47] Advanced formal authentication protocol using smart cards for network applicants
    Limbasiya, Trupil
    Soni, Mukesh
    Mishra, Sajal Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 66 : 50 - 63
  • [48] Considering Security For ZigBee Protocol Using Message Authentication Code
    Kulkarni, Suhas
    Ghosh, Uttam
    Pasupuleti, Haribabu
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [49] Security Protocol For Distributed Networks using Formal Method Specification
    Nandewal, Arun
    Mahendra, Deepesh
    Chandrasekaran, K.
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [50] Verifying cache architecture vulnerabilities using a formal security verification flow
    Ghasempouri, Tara
    Raik, Jaan
    Paul, Kolin
    Reinbrecht, Cezar
    Hamdioui, Said
    Mottaqiallah
    MICROELECTRONICS RELIABILITY, 2021, 119