首页> 外文学位 >Developing strand space based models and proving the correctness of the IEEE 802.11i authentication protocol with restricted security objectives
【24h】

Developing strand space based models and proving the correctness of the IEEE 802.11i authentication protocol with restricted security objectives

机译:开发基于链空间的模型并证明具有受限安全目标的IEEE 802.11i身份验证协议的正确性

获取原文
获取原文并翻译 | 示例

摘要

The security objectives enforce the security policy, which defines what is to be protected in a network environment. The violation of these security objectives induces security threats. We introduce an explicit notion of security objectives for a security protocol. This notion should precede the formal verification process. In the absence of such a notion, the security protocol may be proven correct despite the fact that it is not equipped to defend against all potential threats. In order to establish the correctness of security objectives, we present a formal model that provides basis for the formal verification of security protocols.;We also develop the modal logic, proof based, and multi-agent approaches using the Strand Space framework. In our modal logic approach, we present the logical constructs to model a protocol's behavior in such a way that the participants can verify different security parameters by looking at their own run of the protocol. In our proof based model, we present a generic set of proofs to establish the correctness of a security protocol. We model the 802.11i protocol into our proof based system and then perform the formal verification of the authentication property. The intruder in our model is imbued with powerful capabilities and repercussions to possible attacks are evaluated. Our analysis proves that the authentication of 802.11i is not compromised in the presented model. We further demonstrate how changes in our model will yield a successful man-in-the-middle attack.;Our multi-agent approach includes an explicit notion of multi-agent, which was missing in the Strand Space framework. The limitation of Strand Space framework is the assumption that all the information available to a principal is either supplied initially or is contained in messages received by that principal. However, other important information may also be available to a principal in a security setting, such as a principal may combine information from different roles played by him in a protocol to launch a powerful attack. Our presented approach models the behavior of a distributed system as a multi-agent system. The presented model captures the combined information, the formal model of knowledge, and the belief of agents over time. After building this formal model, we present a formal proof of authentication of the 4-way handshake of the 802.11i protocol.
机译:安全目标强制执行安全策略,该策略定义了网络环境中要保护的内容。违反这些安全目标会引发安全威胁。我们为安全协议引入了明确的安全目标概念。此概念应先于正式验证过程。在没有这样的概念的情况下,尽管安全协议没有配备防御所有潜在威胁的能力,但还是可以证明它是正确的。为了确定安全目标的正确性,我们提出了一个正式模型,该模型为安全协议的形式验证提供了基础。我们还使用Strand Space框架开发了模态逻辑,基于证明和多主体方法。在我们的模态逻辑方法中,我们提出了一种逻辑构造,以对参与者的行为进行建模的方式,使参与者可以通过查看自己的协议运行来验证不同的安全性参数。在基于证明的模型中,我们提出了一套通用的证明来建立安全协议的正确性。我们将802.11i协议建模到基于证明的系统中,然后对身份验证属性进行形式验证。我们模型中的入侵者具有强大的功能,并评估了其对可能攻击的影响。我们的分析证明,在所提出的模型中802.11i的身份验证没有受到损害。我们进一步证明了模型的更改将如何产生成功的中间人攻击。;我们的多主体方法包括明确的多主体概念,但在Strand Space框架中却没有。 Strand Space框架的局限性是假定委托人可用的所有信息要么最初提供,要么包含在该委托人收到的消息中。但是,其他重要信息也可以在安全设置中提供给委托人,例如,委托人可以组合来自其在协议中扮演的不同角色的信息,以发起强大的攻击。我们提出的方法将分布式系统的行为建模为多代理系统。提出的模型捕获了组合信息,知识的形式化模型以及随着时间的推移代理商的信念。建立此正式模型后,我们提供了802.11i协议4次握手身份验证的正式证明。

著录项

  • 作者

    Furqan, Zeeshan.;

  • 作者单位

    University of Central Florida.;

  • 授予单位 University of Central Florida.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2007
  • 页码 159 p.
  • 总页数 159
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号