eck model
Recently Published Documents


TOTAL DOCUMENTS

9
(FIVE YEARS 4)

H-INDEX

1
(FIVE YEARS 0)

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Fuyuan Luo ◽  
Tao Feng ◽  
Lu Zheng

With the rapid development of wireless communication technology in the field of industrial control systems, Wireless HART is an international wireless standard, because of its low cost and strong scalability, as well as its wide range of applications in the industrial control field. However, it is more open communication so that the possibility of increased attacks by external. At present, there are many types of research on wireless protocol security at home and abroad, but they all focus on the realization of the security function of the protocol itself, which has certain limitations for the formal modeling of the protocol security assessment. Taking into account the aforementioned research status, this paper takes the Wireless HART protocol as the research object and adopts the model detection method combining eCK model theory and colored Petri net theory to evaluate and improve the security of the protocol. First, the colored Petri net theory and CPN Tools modeling tool were introduced to verify the consistency of the original model of the protocol. And the eCK model was used to evaluate the security of the original protocol model. It was found that the protocol has two types of man-in-the-middle attack vulnerabilities: tampering and deception. Aiming at the attack loopholes of the protocol, an improvement plan was proposed. After improving the original protocol, CPN Tools modeling tool was used for security verification. It was found that the new scheme improvement can effectively prevent the existing attacks and reasonably improve the security of the protocol.


2011 ◽  
Vol 135-136 ◽  
pp. 289-293
Author(s):  
Wei Wang ◽  
Qing Feng Cheng

In this paper, we analyze two ID-based authenticated key exchange (AKE) protocols in the eCK model. One is a two-party AKE protocol between members of distinct domains proposed by Xia et al. in 2009. The other is a dynamic group AKE protocol proposed by Xie et al. in 2010. The results of analysis show that both of them are insecure in the eCK model.


Sign in / Sign up

Export Citation Format

Share Document