Click for new scientific resources and news about Corona[COVID-19]

Paper Information

Journal:   JOURNAL OF ELECTRONIC AND CYBER DEFENCE   WINTER 2018 , Volume 5 , Number 4 (20) ; Page(s) 109 To 129.
 
Paper: 

Analysis And Evaluation Of The Tetra Network Security Protocols Using Automated Analysis Tools

 
 
Author(s):  Mollazadeh M.*, Sabzineghad M., Rastaghi R.
 
* IMAM HOSSEIN UNIVERSITY
 
Abstract: 
In this paper, the structure of the various versions of the TETRA security protocol is investigated in the “formal model” using Proverif and Scyther automatic analysis tools. The TETRA's network security protocol is a key-exchange one, in which two parties also establish a session key while authenticating each other. This protocol also uses pre-distributed secret keys which are based on the symmetric-encryption schemes. The security analysis of the protocol has been done in the “formal model”, using the Proverif and Scyther automatic analysis tools. Firstly, eight security features including Confidentiality, Authentication, Forward Secrecy, Unknown Key-Share security, Identical Session Key, Unknown Key Security, Anonymity, and Integrity are modeled in these frameworks, and then using both of the two tools, the security of the protocol is investigated regarding the mentioned features. Comparing the results of the formal analysis of these features with the informal analysis resulted from the open sources indicates that there are new security flows in the structure of the protocol respect to “Forward Secrecy” and “integrity”. Finally, several solutions are suggested to overcome these weaknesses.
 
Keyword(s): SECURITY ANALYSIS, FORMAL MODELS, AUTOMATIC ANALYSIS TOOLS, TETRA NETWORK
 
 
International related papers: 
 
Most related Highly related Moderately related Least related
 
References: 
  • Not Registered.
  •  
  •  
 
Citations: 
  • Not Registered.
 
+ Click to Cite.
APA: Copy

MOLLAZADEH, M., & SABZINEGHAD, M., & RASTAGHI, R. (2018). ANALYSIS AND EVALUATION OF THE TETRA NETWORK SECURITY PROTOCOLS USING AUTOMATED ANALYSIS TOOLS. JOURNAL OF ELECTRONIC AND CYBER DEFENCE, 5(4 (20) ), 109-129. https://www.sid.ir/en/journal/ViewPaper.aspx?id=569380



Vancouver: Copy

MOLLAZADEH M., SABZINEGHAD M., RASTAGHI R.. ANALYSIS AND EVALUATION OF THE TETRA NETWORK SECURITY PROTOCOLS USING AUTOMATED ANALYSIS TOOLS. JOURNAL OF ELECTRONIC AND CYBER DEFENCE. 2018 [cited 2022January21];5(4 (20) ):109-129. Available from: https://www.sid.ir/en/journal/ViewPaper.aspx?id=569380



IEEE: Copy

MOLLAZADEH, M., SABZINEGHAD, M., RASTAGHI, R., 2018. ANALYSIS AND EVALUATION OF THE TETRA NETWORK SECURITY PROTOCOLS USING AUTOMATED ANALYSIS TOOLS. JOURNAL OF ELECTRONIC AND CYBER DEFENCE, [online] 5(4 (20) ), pp.109-129. Available: https://www.sid.ir/en/journal/ViewPaper.aspx?id=569380.



 
 
Persian Abstract Yearly Visit 72
 
 
Latest on Blog
Enter SID Blog