{"title":"基于Petri网的无线传感器网络安全协议的形式化证明","authors":"Yingjiu Guo, Xuemei Liu, Xiufeng Shao","doi":"10.1109/CIS.2013.146","DOIUrl":null,"url":null,"abstract":"In this paper, the Security Petri Net model is adopted to formally prove security protocol in the field of wireless sensor networks. As a result of this analysis, a man-in-the-middle-attack has been found and an improved version of the protocol is proposed. And the results show that the Security Petri Net model is a simple and efficient method to prove the security of of security protocol.","PeriodicalId":294223,"journal":{"name":"2013 Ninth International Conference on Computational Intelligence and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Formal Proof of the Security Protocol in Wireless Sensor Network Based on the Petri Net\",\"authors\":\"Yingjiu Guo, Xuemei Liu, Xiufeng Shao\",\"doi\":\"10.1109/CIS.2013.146\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, the Security Petri Net model is adopted to formally prove security protocol in the field of wireless sensor networks. As a result of this analysis, a man-in-the-middle-attack has been found and an improved version of the protocol is proposed. And the results show that the Security Petri Net model is a simple and efficient method to prove the security of of security protocol.\",\"PeriodicalId\":294223,\"journal\":{\"name\":\"2013 Ninth International Conference on Computational Intelligence and Security\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Ninth International Conference on Computational Intelligence and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2013.146\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Ninth International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2013.146","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Formal Proof of the Security Protocol in Wireless Sensor Network Based on the Petri Net
In this paper, the Security Petri Net model is adopted to formally prove security protocol in the field of wireless sensor networks. As a result of this analysis, a man-in-the-middle-attack has been found and an improved version of the protocol is proposed. And the results show that the Security Petri Net model is a simple and efficient method to prove the security of of security protocol.