The Security Study of an EC Protocol Based on Casper/FDR2

Article Preview

Abstract:

Researchers have proposed several security protocols to protect the electronic commerce security in these years; however, not all of them are secure enough. This article extends model checking method with Casper/FDR2 to model and analyze a new electronic protocol. Attacks are found in the protocol and their mechanisms are discussed. A variety of solutions are given to different security flaws. The improved protocol is proven to be robust and secure.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

249-252

Citation:

Online since:

October 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Ray I, Natarajan N. An anonymous and failure resilient fair exchange e-commerce protocol [J]. Decision Support Systems, 2005, 39: 267-292.

DOI: 10.1016/j.dss.2003.10.011

Google Scholar

[2] Zhang Q, Markantonakis K, Mayes K. A practical fair-exchange e-payment protocol for anonymous purchase and physical delivery [C]/ Proc of IEEE Int Conf on Computer System and Application. Washing D C: IEEE Press, 2006: 850-858.

DOI: 10.1109/aiccsa.2006.205188

Google Scholar

[3] Das Vinu V. Secure and anonymous electronic commerce protocol over a public network [C]/ 2nd International Conference on Internet Multimedia Services Architecture and Applications. Washing D C: IEEE Press, 2008: 1-6.

DOI: 10.1109/imsaa.2008.4753930

Google Scholar

[4] Lowe G. Casper: a compiler for the analysis of security protocols [J]. Journal of Computer Security, 1998, 6: 53-84.

Google Scholar

[5] Formal Systems (Europe) Ltd. Failure Divergence Refinement FDR2 User Manual, version 2. 83 edition 2007 [R/OL]. [2012-04-20]. http: /www. fsel. com/documentation/fdr2/fdr2maual. pdf.

Google Scholar

[6] Qing Sihan. Twenty years development of security protocols research [J]. Journal of Software, 2003, 14(10): 1740-1752.

Google Scholar

[7] Han Z G , Luo J Z, Wang L M. Extended-CSP based analysis of non-repudiation protocols [J]. Journal on Communications, 2008, 29(10): 8-18.

Google Scholar

[8] Xu Yang, Xie Xiaoyao. Extending Rubin logic for electronic commerce protocols [C]/ 2nd International Conference on Anti-counterfeiting, Security and Identification. Washing D C: IEEE Press, 2008: 448-451.

DOI: 10.1109/iwasid.2008.4688446

Google Scholar

[9] Xue Rui, Feng Dengguo. The approaches and technologies for formal verification of security protocols [J]. Chinese Journal of Computers, 2006, 1(29): 1-20.

Google Scholar