J4

• Original Articles • Previous Articles     Next Articles

An approach to the formal analysis of the TMN protocol

LIU Xiu-ying1,2;ZHANG Yu-qing2;YANG Bo1;XING Ge2

  

  1. (1. State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an 710071, China;
    2. National Computer Network Intrusion Protection Center, Chinese Academy of Sciences, Beijing 100039, China)
  • Received:1900-01-01 Revised:1900-01-01 Online:2004-10-20 Published:2004-10-20

Abstract: This paper analyzes the TMN protocol comprehensively using a formal analysis method called the running-mode analysis and uncovers a number of attacks on the TMN protocol. According to the detailed forms of these attacks and the different intentions of the intruder, we classify these attacks. Finally, linking with known attacks, we deduce that the running-mode analysis has analyzed the TMN protocol effectively.

Key words: TMN protocol, model checking, cryptographi protocol, running-mode analysis

CLC Number: 

  • TP309