مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

1,366
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

ANALYSIS AND EVALUATION OF THE TETRA NETWORK SECURITY PROTOCOLS USING AUTOMATED ANALYSIS TOOLS

Pages

  109-129

Abstract

 In this paper, the structure of the various versions of the TETRA security protocol is investigated in the “formal model” using Proverif and Scyther AUTOMATIC ANALYSIS TOOLS. The TETRA's network security protocol is a key-exchange one, in which two parties also establish a session key while authenticating each other. This protocol also uses pre-distributed secret keys which are based on the symmetric-encryption schemes. The SECURITY ANALYSIS of the protocol has been done in the “formal model”, using the Proverif and Scyther AUTOMATIC ANALYSIS TOOLS. Firstly, eight security features including Confidentiality, Authentication, Forward Secrecy, Unknown Key-Share security, Identical Session Key, Unknown Key Security, Anonymity, and Integrity are modeled in these frameworks, and then using both of the two tools, the security of the protocol is investigated regarding the mentioned features. Comparing the results of the formal analysis of these features with the informal analysis resulted from the open sources indicates that there are new security flows in the structure of the protocol respect to “Forward Secrecy” and “integrity”. Finally, several solutions are suggested to overcome these weaknesses.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    MOLLAZADEH, M., SABZINEGHAD, M., & RASTAGHI, R.. (2018). ANALYSIS AND EVALUATION OF THE TETRA NETWORK SECURITY PROTOCOLS USING AUTOMATED ANALYSIS TOOLS. JOURNAL OF ELECTRONIC AND CYBER DEFENCE, 5(4 (20) ), 109-129. SID. https://sid.ir/paper/243120/en

    Vancouver: Copy

    MOLLAZADEH M., SABZINEGHAD M., RASTAGHI R.. ANALYSIS AND EVALUATION OF THE TETRA NETWORK SECURITY PROTOCOLS USING AUTOMATED ANALYSIS TOOLS. JOURNAL OF ELECTRONIC AND CYBER DEFENCE[Internet]. 2018;5(4 (20) ):109-129. Available from: https://sid.ir/paper/243120/en

    IEEE: Copy

    M. MOLLAZADEH, M. SABZINEGHAD, and R. RASTAGHI, “ANALYSIS AND EVALUATION OF THE TETRA NETWORK SECURITY PROTOCOLS USING AUTOMATED ANALYSIS TOOLS,” JOURNAL OF ELECTRONIC AND CYBER DEFENCE, vol. 5, no. 4 (20) , pp. 109–129, 2018, [Online]. Available: https://sid.ir/paper/243120/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button