Computer Science ›› 2019, Vol. 46 ›› Issue (8): 206-211.doi: 10.11896/j.issn.1002-137X.2019.08.034

• Information Security • Previous Articles     Next Articles

Formal Verification of Cloud-aided Lightweight Certificateless Authentication Protocol Based on Probabilistic Model

XIA Nu-nu, YANG Jin-ji, ZHAO Gan-sen, MO Xiao-shan   

  1. (School of Computing,South China Normal University,Guangzhou 510631,China)
  • Received:2018-07-20 Online:2019-08-15 Published:2019-08-15

Abstract: Anonymous wireless body area networks communication technology is one of the most powerful means to protect the privacy of Internet users and servers,but formal authentication of anonymous wireless body area networks certificateless authentication protocol is still a difficult problem to be solved.The method of probabilistic model detection is used to set up a discrete time Markov chain model based on a cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks.The attack rate is added to the state migration of the protocol modeling,and in particular,the attack rate was analyzed quantitatively.The protocol attributes are described with the probability calculation tree logic,the PRISM namely a probabilistic model testing tool was used for quantitative analysis and verification of the protocol,and the performance of the protocol was compared with the SIP protocol.The result shows that the attack rate between the entities of the cloud-aided lightweight certificateless authentication protocol has different influence on non-repudiation,time delay and effectiveness of the protocol under anonymous WBANs communication environment.The control of the attack rate can improve the security of the protocol.It is of great significance to the quality of medical services,the improvement of real-time monitoring efficiency and the basic needs of telemedicine

Key words: Attack rate, Cloud-aided lightweight certificateless authentication protocol, PRISM, Probabilistic model checking, Wireless body area networks

CLC Number: 

  • TP301
[1]ARMBRUST M,FOX A,GRIFFITH R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58.
[2]SMITH D B,MINIUTTI D,LAMAHEWA T A,et al.Propagation Models for Body-Area Networks:A Survey and New Outlook[J].IEEE Antennas & Propagation Magazine,2014,55(5):97-117.
[3]SABAHI F.Cloud computing security threats and responses [C]∥International Conference on Communication Software and Networks.IEEE,2011:245-249.
[4]CHEN T,KWIATKOWSKA M,PARKER D,et al.Verifying Team Formation Protocols with Probabilistic Model Checking[M]∥Computational Logic in Multi-Agent Systems.Springer Berlin Heidelberg,2011:190-207.
[5]LAPLANTE S,LASSAIGNE R,MAGNIEZ F,et al.Probabilistic abstraction for model checking:an approach based on property testing[J].Proceedings-Symposium on Logic in Computer Science,2002,8(4):30-39.
[6]HEATH J,KWIATKOWSKA M,NORMAN G,et al.Probabilistic Model Checking of Complex Biological Pathways[M]∥Computational Methods in Systems Biology.Springer Berlin Heidelberg,2006:32-47.
[7]FENG B,MA X,GUO C,et al.An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing[J].IEEE Access,2017,4(99):7899-7911.
[8]YANG B,FENG D G,QIN Y,et al.Secure Access Scheme of Cloud Services for Trusted Mobile Terminals using TrustZone[J].Journal of Software,2016,27(6):1366-1383.(in Chinese) 杨波,冯登国,秦宇,等.基于TrustZone的可信移动终端云服务安全接入方案[J].软件学报,2016,27(6):1366-1383.
[9]WU L B,ZHANG Y B,HE D B.Identity based double server ciphertext equivalence decision protocol in cloud computing[J].Computer Research And Development,2017,54(10):2232-2243.(in Chinese) 吴黎兵,张宇波,何德彪.云计算中基于身份的双服务器密文等值判定协议[J].计算机研究与发展,2017,54(10):2232-2243.
[10]SHEN J,GUI Z,JI S,et al.Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks[J].Journal of Network & Computer Applications,2018,106:117-123.
[11]KWIATKOWSKA M,NORMAN G,PARKER D.Advances and challenges of probabilistic model checking[C]∥Communication,Control,and Computing.IEEE,2010:1691-1698.
[12]SHARIR M,PNUELI A,HART S.Verification of probabilistic programs[M].Society for Industrial and Applied Mathematics,1984.
[13]KWIATKOWSKA M,NORMAN G,PARKER D.PRISM 4.0:Verification of Probabilistic Real-Time Systems[J].Lecture Notes in Computer Science,2011,6806:585-591.
[14]LIU L,HASAN O,TAHAR S.Formal Reasoning About Finite-State Discrete-Time Markov Chains in HOL[J].Journal of Computer Science & Technology,2013,28(2):217-231.
[15]BALTAZAR P,MATEUS P,NAGARAJAN R,et al.Exoge- nous Probabilistic Computation Tree Logic[J].Electronic Notes in Theoretical Computer Science,2007,190(3):95-110.
[16]ROSTAMI M,BAGHERI E,LOTFI M.Cooperating the web services as distributed to create a Non- Repudiation service[J].International Proceedings of Economics Development & Research,2007,4526:9-19.
[17]WANG J,WANG Z,DING S,et al.Refined Jensen-Based Multiple Integral Inequality and Its Application to Stability of Time-Delay Systems[J].IEEE/CAA Journal of Automatica Sinica,2018,5(3):758-764.
[18]KREMER S.Formal Analysis of Optimistic Fair Exchange Pro- tocols[J].Journal of Software,2003,2004(3):509-521.
[19]WU L,ZHANG Y,WANG F.A new provably secure authentication and key agreement protocol for SIP using ECC[J].Computer Standards & Interfaces,2009,31(2):286-291.
[1] MA Si-qi, CHE Xiao-ping, YU Qi, YUE Chen-feng. Event-based User Experience Evaluation Method for Virtual Reality Applications [J]. Computer Science, 2021, 48(2): 167-174.
[2] ZHOU Nv-qi, ZHOU Yu. Multi-objective Verification of Web Service Composition Based on Probabilistic Model Checking [J]. Computer Science, 2018, 45(8): 288-294.
[3] LIU Shuang, WEI Ou, GUO Zong-hao. Infinite-horizon Optimal Control of Genetic Regulatory Networks Based on Probabilistic Model Checking and Genetic Algorithm [J]. Computer Science, 2018, 45(10): 313-319.
[4] DU Yi, HE Yang and HONG Mei. Application of Probabilistic Model Checking in Dynamic Power Management [J]. Computer Science, 2018, 45(1): 261-266.
[5] GUO Zong-hao and WEI Ou. Optimal Control of Probabilistic Boolean Networks Using Model Checking [J]. Computer Science, 2017, 44(5): 193-198.
[6] KAI Jin-yu, MIAO Huai-kou and GAO Hong-hao. Verification QoS of Web Services Compositional Processes [J]. Computer Science, 2015, 42(12): 120-123.
[7] . Validation of Web Service Composition Based on Probabilistic Model Checking [J]. Computer Science, 2012, 39(1): 120-123.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!