Learn More
The paper proposes the cryptographic protocol insecurity problem, gives an accurate formal specifications for cryptographic protocols, defines the security properties precisely and reasonably, presents some pivotal concepts and propositions in the deduction of the problem solving. The method has provable semantics which is reasonable and sound, and it is(More)
Ad hoc network is a collection of wireless mobile nodes that could be self-configured with no aid of any established infrastructure, which, however, is commonly susceptible to various attacks. The relevant researches for ad hoc networks have been currently focused on these aspects mentioned above to further solve various security problems. In this(More)
Many large-scale software systems have unprecedented complexity. The basic problem lies in how to construct a complex network topology models that can reflect the complexity of software systems. Based on studying the theory development and application status of complex networks, the complex network topology rules based on component of software system are(More)
Mobile Ad hoc Network (MANET) is self-organizing, infrastructureless, multi-hop network. The wireless and distributed nature of MANETs and the very bad security environment in battlefield bring a great challenge to securing tactical mobile ad hoc networks. Most schemes proposed recently focus on specific security areas, such as establishing trust(More)
To ensure the security of information systems, security risk have to be accurately evaluate first. Because security risk is influenced by attackers and defenders, it is necessary to consider the costs and benefits of both sides. However, the current evaluation methods mostly focus on one side. To solve the problem, in this paper we propose a security risk(More)
Complexity is an inherence of software systems. Network models are valid and significant models to describe large-scale complex systems. On the basis of studying the theory development and application status of complex networks, the complex network topology rules based on component of software system security is proposed, the formalized definition of(More)
In this paper, protocol insecurity problem is described, and AI planning system is used to solve the problem. Based on running characteristics and laws of cryptographic protocols, a planning-based formal model for cryptographic protocol analysis is presented, after its first-order syntax, formal definition and operational semantics are given, formalization(More)
In mobile ad hoc networks (MANETs), a single certificate authority (CA) node could be a security bottleneck. Multiple replica of CA is fault tolerant, but the network is as vulnerable as single CA or even worse since breaking one of the CAs means breaking all of them. Many distributed CA models based on the secret sharing scheme are proposed. In this paper,(More)
In this paper, the insecurity problem of cryptographic protocol is proposed. To solve this problem, we give an accurate formal specifications for cryptographic protocols, and define the security properties precisely and reasonably, presenting some critical concepts and propositions in the deduction of the problem solving. The method of this paper with(More)