Trusted network access protocols are proposed for the security and authorization of network-access requests. Because they differ greatly from traditional security protocols on security demands, they can not be analyzed with previous strand space works directly. To solve this problem, we first give some extensions necessary to verify them in this letter. Moreover, we point out Zhuo Ma et al.'s MN-TAP protocol is unsecure based on the Strand Space Model (SSM), and then improve the MN-TAP protocol and show that the improved MN-TAP protocol is secure in the SSM.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Yuelei XIAO, Yumin WANG, Liaojun PANG, "Verification of Trusted Network Access Protocols in the Strand Space Model" in IEICE TRANSACTIONS on Fundamentals,
vol. E95-A, no. 3, pp. 665-668, March 2012, doi: 10.1587/transfun.E95.A.665.
Abstract: Trusted network access protocols are proposed for the security and authorization of network-access requests. Because they differ greatly from traditional security protocols on security demands, they can not be analyzed with previous strand space works directly. To solve this problem, we first give some extensions necessary to verify them in this letter. Moreover, we point out Zhuo Ma et al.'s MN-TAP protocol is unsecure based on the Strand Space Model (SSM), and then improve the MN-TAP protocol and show that the improved MN-TAP protocol is secure in the SSM.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E95.A.665/_p
Copy
@ARTICLE{e95-a_3_665,
author={Yuelei XIAO, Yumin WANG, Liaojun PANG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Verification of Trusted Network Access Protocols in the Strand Space Model},
year={2012},
volume={E95-A},
number={3},
pages={665-668},
abstract={Trusted network access protocols are proposed for the security and authorization of network-access requests. Because they differ greatly from traditional security protocols on security demands, they can not be analyzed with previous strand space works directly. To solve this problem, we first give some extensions necessary to verify them in this letter. Moreover, we point out Zhuo Ma et al.'s MN-TAP protocol is unsecure based on the Strand Space Model (SSM), and then improve the MN-TAP protocol and show that the improved MN-TAP protocol is secure in the SSM.},
keywords={},
doi={10.1587/transfun.E95.A.665},
ISSN={1745-1337},
month={March},}
Copy
TY - JOUR
TI - Verification of Trusted Network Access Protocols in the Strand Space Model
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 665
EP - 668
AU - Yuelei XIAO
AU - Yumin WANG
AU - Liaojun PANG
PY - 2012
DO - 10.1587/transfun.E95.A.665
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E95-A
IS - 3
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - March 2012
AB - Trusted network access protocols are proposed for the security and authorization of network-access requests. Because they differ greatly from traditional security protocols on security demands, they can not be analyzed with previous strand space works directly. To solve this problem, we first give some extensions necessary to verify them in this letter. Moreover, we point out Zhuo Ma et al.'s MN-TAP protocol is unsecure based on the Strand Space Model (SSM), and then improve the MN-TAP protocol and show that the improved MN-TAP protocol is secure in the SSM.
ER -