Computer Science ›› 2009, Vol. 36 ›› Issue (8): 3-7.

Previous Articles     Next Articles

Survey on Modelling and Verification of Time Sensitive Security Protocol

ZHOU Ti,LI Zhon-jun,WANG Zhi-yong,WANG Jin-ying   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Security protocols arc used to provide secure communication over open network. I}imcstamp can make sure the freshness of the message in the protocol,but it is not enough to research the time sensitive protocols,and there are no effective methods that can verify these protocols.So it's very difficult to verify all aspects of those huge and complex protocols in formal ways. This paper described why using time-stamp and researching it,and discussed several popular methods in this field which are MSR method,induction method CSP method and BAN logic method in werification of time sensitive security protocols. This paper gave out their estimations. Finally we also strated the possible new directions of time sensitive security protocols verification.

Key words: Security protocols, Formal verification, Timed model, Time-stamp

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!