Survey on Modelling and Verification of Time Sensitive Security Protocol

周倜,李舟军,王志勇,王巾盈
DOI: https://doi.org/10.3969/j.issn.1002-137x.2009.08.002
2009-01-01
Computer Science
Abstract:Security protocols are used to provide secure communication over open network.Time-stamp can make sure the freshness of the message in the protocol,but it is not enough to research the time sensitive protocols,and there are no effective methods that can verify these protocols.So it's very difficult to verify all aspects of those huge and complex protocols in formal ways.This paper described why using time-stamp and researching it,and discussed several popular methods in this field which are MSR method,induction method,CSP method and BAN logic method in verification of time sensitive security protocols.This paper gave out their estimations.Finally we also stated the possible new directions of time sensitive security protocols verification.
What problem does this paper attempt to address?