Proceedings of the 2015 International Industrial Informatics and Computer Engineering Conference

New Defense System of Military Network based on Minimization of Counterexamples Algorithm on Model Checking

Authors
Jian-ping Jiang, Qing-long Xing, Wei Deng
Corresponding Author
Jian-ping Jiang
Available Online March 2015.
DOI
10.2991/iiicec-15.2015.338How to use a DOI?
Keywords
network security; model checking; counterexample; protocol
Abstract

Network is the basis of the army informationization construction, and security is the guarantee for the army informationization construction. The article firstly analyzes the hidden trouble of the military network and the lack of defense methods, and then introduces a new defense system of military network based on minimization of counterexamples algorithm on model checking, to analyze the validity of the network security protocols. The algorithm, based on the algorithm Gastin P proposes, and then given an informal analysis on the well-known Needham-Schroeder public-key authentication protocol, can provide quite efficient and omnidirectional security for military networks.

Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2015 International Industrial Informatics and Computer Engineering Conference
Series
Advances in Computer Science Research
Publication Date
March 2015
ISBN
978-94-62520-54-7
ISSN
2352-538X
DOI
10.2991/iiicec-15.2015.338How to use a DOI?
Copyright
© 2015, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Jian-ping Jiang
AU  - Qing-long Xing
AU  - Wei Deng
PY  - 2015/03
DA  - 2015/03
TI  - New Defense System of Military Network based on Minimization of Counterexamples Algorithm on Model Checking
BT  - Proceedings of the 2015 International Industrial Informatics and Computer Engineering Conference
PB  - Atlantis Press
SP  - 1527
EP  - 1532
SN  - 2352-538X
UR  - https://doi.org/10.2991/iiicec-15.2015.338
DO  - 10.2991/iiicec-15.2015.338
ID  - Jiang2015/03
ER  -