Computer and Modernization ›› 2012, Vol. 1 ›› Issue (200): 17-06.doi: 10. 3969/j. issn. 1006-2475.2012.04.005

• 信息安全 • Previous Articles     Next Articles

Formal Verification of Kaman Protocol

WEN Shuang-ju   

  1. High-level School Admissions Office of Gansu Province, Lanzhou 730030, China
  • Received:2012-02-06 Revised:1900-01-01 Online:2012-04-16 Published:2012-04-16

Abstract:

Kaman is security authentication scheme of mobile Ad Hoc networks. However, the author of Kaman didn’t verify security of the protocol by using formal method. Protocol Composition Logic (PCL) is formal verification logic of security protocol. This logic can simplify the process of protocol verification. This paper describes Kaman and analyzes its security properties in PCL. It is proved that Kaman can implement its security aim.

Key words: Ad Hoc networks, protocol composition logic, Kaman protocol