Computer and Modernization ›› 2012, Vol. 1 ›› Issue (200): 17-06.doi: 10. 3969/j. issn. 1006-2475.2012.04.005
• 信息安全 • Previous Articles Next Articles
WEN Shuang-ju
Received:
Revised:
Online:
Published:
Abstract:
Kaman is security authentication scheme of mobile Ad Hoc networks. However, the author of Kaman didn’t verify security of the protocol by using formal method. Protocol Composition Logic (PCL) is formal verification logic of security protocol. This logic can simplify the process of protocol verification. This paper describes Kaman and analyzes its security properties in PCL. It is proved that Kaman can implement its security aim.
Key words: Ad Hoc networks, protocol composition logic, Kaman protocol
WEN Shuang-ju. Formal Verification of Kaman Protocol[J]. Computer and Modernization, 2012, 1(200): 17-06.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10. 3969/j. issn. 1006-2475.2012.04.005
http://www.c-a-m.org.cn/EN/Y2012/V1/I200/17