期刊文献+

移动代理完整性协议形式化分析方法研究 被引量:2

Research on Formal Analysis Method of Mobile Agent Data Integrity Protocol
在线阅读 下载PDF
导出
摘要 本文给出了移动代理协议数据完整性属性的定义,指出了采用传统认证性属性来分析移动代理数据完整性属性的不足,从而给出了移动代理完整性证明的两个形式化规约:数据完整性规约和序列完整性规约.在此基础上,针对典型协议实例进行CPS建模,并采用阶函数的方法证明了其完整性,验证了完整性规约的正确性和有效性. This paper gives a formal analysis method of mobile agent data integrity protocol. We pointed out that authentication property is not suit to analysis mobile agent data integrity, and proposed two formal specifications for mobile agent data integrity. We constructed a CSP model for a concrete mobile agent data integrity protocol, checked its integrity using rank function. These works prove formal analysis method is effective in analyzing mobile agent data integrity protocol.
出处 《电子学报》 EI CAS CSCD 北大核心 2009年第8期1669-1674,共6页 Acta Electronica Sinica
基金 国家自然科学基金(No.60573042) 中国科学院创新基金(No.CXJJ251)
关键词 移动代理 数据完整性 形式化方法 形式化模型 mobile agents data integrity path integrity formal analysis formal model
作者简介 李鹏飞 男,1974年生于河北定州,博士生,主要研究方向:分布式系统安全、移动代理系统及其安全性、安全协议分析.E-mail:pfli@los.cn 马恒太 男,1970年生于山东临朐,副研究员,主要研究方向:大型网络信息安全、卫星网络安全.
  • 相关文献

参考文献11

  • 1X Hannotin, P Maggi, Riccardo Sisto. Formal specification and verification of mobile agent data integrity properties: a case study[ A]. Mobile Agents: 5th Intemational Conference[ C]. Atlanta, GA, USA, 2001.41.
  • 2P Ryan,等著,张玉清,等译.安全协议的建模与分析[M].北京,机械工业出版社,2005.
  • 3P Maggi, R Sisto. Experiments on formal verification of mobile agent data integrity properties [ A ]. Workshop on Objects and Agents 2002(WOA2002) [C]. Milano, Italy, 2002.131 - 136.
  • 4Raja Al-Jaljouli. A Proposed Security Prototcol for Data Gathering Mobile Agents [ R]. The University of New South Wales, Report, Sydney, Australia, 21304.
  • 5Raja Al-Jaljouli. Formal Methods in the Enhancement of the Data Security Protocols of Mobile Agents[ R]. The University of New South Wales,Report, Sydney,Australia,2005.
  • 6李鹏飞,卿斯汉,马恒太,邓勇.新颖的移动代理动态数据完整性保护协议[J].通信学报,2007,28(8):1-10. 被引量:1
  • 7P Maggi, R Sisto. A configurable mobile agent data protection protocol[A]. AAMAS'03 [ C]. Melbourne, Australia, 2003. 851 - 858,.
  • 8S A Schneider. Verifying authentication protocols with CSP[ J]. IFEF. Transaclions on Software Engineering. 1998,24(9):741 - 758.
  • 9S A Schneider. Formal analysis of a non-repudiation protocol[A]. 11th Computer Security Foundations Workshop[C]. Rockport Massachusetts: IEEE Computer Society Press, 1998. 54 - 65.
  • 10G Karjoth,N Asokan,C Gulcu. Protecting the computation resuits of free-roaming agents[J] .Personal and Ubiquitous Compuling, 1998,2(2) :92 - 99.

二级参考文献21

  • 1VIGNA G.Protecting mobile agents through tracing[A].Proceedings of the Third ECOOP Workshop on Mobile Objects Systems[C].Finnland,1997.
  • 2KARJOTH G.Secure mobile agent-based merchant brokering in distributed marketplaces[A].Proc ASA/MA 2000(D.Kotz and F.Mattern,eds.)[C].Berlin Heidelberg:Springer Verlag,2000.44-56.
  • 3KARJOTH G,ASOKAN N,GULCU C.Protecting the computation results of free-roaming agents[A].Second International Workshop on Mobile Agents[C].1998.224-234.
  • 4YEE B S.A sanctuary for mobile agents[A].Secure Internet Programming Security Issues for Mobile and Distributed Objects[C].Springer-Verlag,Berlin Germany,1999.261-273.
  • 5MAGGI P,SISTO R.Experiments on formal verification of mobile agent data integrity properties[EB/OL].http://www.labic.disco.unimib.it/ woa2002/papers/15.pdf,2002.
  • 6HANNOTIN X.MAGGI P.SISTO R.Formal specification and verification of mobile agent data integrity properties:a case study[A].LNCS[C].Springer-Verlag,2001.42-53.
  • 7STA documentation[EB/OL].http://www.dsi.unifi.it/-boreale/ documentation.html.
  • 8STA:A tool for trace analysis of cryptographic protocols,ML object code and examples[EB/OL].http://www.dsi.unifi.it/ - boreale/ tool.html,2001.
  • 9CORRADI A,MONTANARI R,STEFANELLI C.Mobile agents protection in the Internet environment[A].The 23^rd Annual International Computer Software and Application Conference (COMPSAC'99)[C].1999.80-85.
  • 10KARNIK N M,TRIPATHI A R.Security in the Ajanta Mobile Agent System.Technical Report TR-5-99[R].University of Minnesota,Minneapolis,MN 55455,U.S.A,1999.

同被引文献19

  • 1王榕,许磊,樊宇涛.VxWorks下基于BSD Socket的网络通信[J].电脑编程技巧与维护,2006(8):77-80. 被引量:2
  • 2杨超,张伟哲,张宏莉,田舟贤,方滨兴.基于检查点算法的网格计算容错机制研究[J].微电子学与计算机,2006,23(9):82-84. 被引量:6
  • 3Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks [ C ]//Proceeding of the 2003 IEEE Symposium on Security and Privacy. Berkeley, CA, USA, 2003: 197-213.
  • 4Perrig A, Szewczyk R, Wen V, et al. SPINS: security protocols for sensor networks I J ]- Wireless Networks Journal, 2002, 8(5) : 521 -534.
  • 5Zhu S, Setia S, Jajodia S. LEAP + : efficient security mechanisms for large-scale distributed sensor networks [ J]. ACM Transactions on Sensor Networks, 2006, 2 (4) : 500-528.
  • 6Deng J, Han R, Mishra S. INSENS : intrusion-tolerant routing in wireless sensor networks [ J ]. Computer Com- munications, 2006, 29(2): 216-230.
  • 7Lazos L, Poovendran R. SeRLoc: secure range-inde- pendent localization for wireless sensor networks [ C ]// Proceedings of the 4th International Symposium on In- formation Processing in Sensor Networks. Los Angeles,CA, USA, 2005:21 -30.
  • 8Chan H, Perdg A, Przydatek B. SIA: secure informa- tion aggregation in sensor networks [ J ]. Journal of Computer Security, 2007, 15( 1 ) : 69 - 102.
  • 9Hannotin X, Maggi P, Sisto R. Formal specification and verification of mobile agent data integrity proper- ties: a case studyl C]//Proceedings of the 5th Interna- tional Conference on Mobile Agents. Atlanta, GA, USA, 2001:42-53.
  • 10Dojen R, Lasc I, Coffey T. Establishing and fixing a freshness flaw in a key-distribution and authentication protocol [ C ]//IEEE the 4th International Conference on Intelligent Computer Communication and Process- ing. 2008. Cluj-Napoca, Romania, 2008:185 - 192.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部