Font Size: a A A

Research On Network Security Protocol Based On Verification Method

Posted on:2016-04-22Degree:MasterType:Thesis
Institution:UniversityCandidate:PHILAVANH PHONVIPHONEFull Text:PDF
GTID:2308330464474107Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Since entering the new century, the development of manufacturing industry, electronic products has been so quick, and production cost has been reduced so dramatically that the wireless network technology has been more widely used. Numerous wireless electronic products appear in front of people. Compared with wired networks, wireless network does not have bloated network connection, and can be used easily by people anytime and anywhere.At the same time, the convenient wireless network will bring a lot of security problems.How to improve the network security and protect the privacy of people is hot topic in public. Due to the openness, lack of physical protection and transferring the signals throughout the wireless media, the wireless network bring the advantages for the users while causing problems of being monitored.Promoting the security level of wireless network is very important for protecting people’s information security and capital safety.In the thesis, the some of useful reference models are provided through studying the behaviors of wireless network security, and some results of protecting information safety of users are given when using the wireless network.In the thesis, the current situation of the development of wireless network and wireless network security requirements is introduced, and the existing attacks and threats in the wireless network are put forward, and the method of formal verification for its security protocols is presented.Secondly, a detailed introduction of the protocol verification of wireless network security based on communicating sequential process(CSP) is covered, and the semantics and syntax of the CSP language are mentioned. In addition, the wireless network protocol with secure socket layer(SSL) is presented, and formal verification and improvement of the protocol are given, making the security of wireless network to further be improved and the ability of wireless local area network against attacks enhanced. Finally, in this thesis, formal modeling and verification for the wireless network in a typical protocol ASK are given, and the results show that the original ASK protocol has some defects of the security, according to the result given by FDR validation tool. In this thesis, the model of the improving ASK protocol is suggested, and the final results show that the improved security protocol model can satisfy the requirements.
Keywords/Search Tags:Wireless Network, Security Protocol, Communication Sequential Process(CSP), Formal Verification
PDF Full Text Request
Related items