Formal modeling and security analysis method of security protocol based on CPN

To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of s...

Full description

Saved in:
Bibliographic Details
Main Authors: Xiang GONG, Tao FENG, Jinze DU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2021-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021175/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539247834660864
author Xiang GONG
Tao FENG
Jinze DU
author_facet Xiang GONG
Tao FENG
Jinze DU
author_sort Xiang GONG
collection DOAJ
description To solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved.
format Article
id doaj-art-3db7b8c7d66a42ce98b41f47d0edd2e3
institution Kabale University
issn 1000-436X
language zho
publishDate 2021-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-3db7b8c7d66a42ce98b41f47d0edd2e32025-01-14T07:22:50ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2021-09-014224025359745040Formal modeling and security analysis method of security protocol based on CPNXiang GONGTao FENGJinze DUTo solve the problem of modeling and analyzing with colored Petri net (CPN), which was determining vulnerabilities in hole location but couldn’t identify any attack path, and the problem of when the introduction of the attacker model, the number of possible message paths in the CPN formal model of security protocol surges the state space prone to explosion, which made it difficult to extract accurate attack paths, the formal modeling method of security protocol was improved base on CPN, the attack paths were verified and extracted, further the fine-grained protocol modeling and control were adopted.As well as in the aspect of state-space convergence, and a waiting-sync method for different processes of CPN model in each hierarchy model was proposed, which effectively controlled the state-space scale of the model.Through the security evaluation and analysis of TMN protocol, 25 attack paths of the protocol are extracted successfully, the security of the protocol is evaluated, and the effectiveness of the proposed method is proved.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021175/colored Petri netsecurity protocolformal analysisstate spaceattack path
spellingShingle Xiang GONG
Tao FENG
Jinze DU
Formal modeling and security analysis method of security protocol based on CPN
Tongxin xuebao
colored Petri net
security protocol
formal analysis
state space
attack path
title Formal modeling and security analysis method of security protocol based on CPN
title_full Formal modeling and security analysis method of security protocol based on CPN
title_fullStr Formal modeling and security analysis method of security protocol based on CPN
title_full_unstemmed Formal modeling and security analysis method of security protocol based on CPN
title_short Formal modeling and security analysis method of security protocol based on CPN
title_sort formal modeling and security analysis method of security protocol based on cpn
topic colored Petri net
security protocol
formal analysis
state space
attack path
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2021175/
work_keys_str_mv AT xianggong formalmodelingandsecurityanalysismethodofsecurityprotocolbasedoncpn
AT taofeng formalmodelingandsecurityanalysismethodofsecurityprotocolbasedoncpn
AT jinzedu formalmodelingandsecurityanalysismethodofsecurityprotocolbasedoncpn