TY - GEN
T1 - Quantitative BAN Logic Based on Belief Degree
AU - Li, Kaixuan
AU - Wu, Hengyang
AU - Xu, Jinyi
AU - Chen, Yixiang
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
PY - 2022
Y1 - 2022
N2 - Authentication protocols are the basis for secure communication in many distributed systems but are highly prone to errors in their design, preventing them from working properly. It is therefore necessary to analyze an authentication protocol to determine whether the designed protocol meets the requirements. Much attention has been paid to mathematical logic to analyze cryptographic protocols, particularly the logic proposed by Burrows, Abadi, and Needham (BAN logic). This logic has been successful in identifying weaknesses in various examples of authentication protocols. In this paper, we give a concept of “belief” for BAN logic based on the idea of possibility computation and further propose a quantitative BAN logic. It is also applied to the formal analysis and computation of a Radio Frequency Identification (RFID) authentication protocol to show how it works. The quantitative results on belief show that the proposed quantitative approach of BAN logic based on belief can more objectively reflect the security property of the authentication protocol.
AB - Authentication protocols are the basis for secure communication in many distributed systems but are highly prone to errors in their design, preventing them from working properly. It is therefore necessary to analyze an authentication protocol to determine whether the designed protocol meets the requirements. Much attention has been paid to mathematical logic to analyze cryptographic protocols, particularly the logic proposed by Burrows, Abadi, and Needham (BAN logic). This logic has been successful in identifying weaknesses in various examples of authentication protocols. In this paper, we give a concept of “belief” for BAN logic based on the idea of possibility computation and further propose a quantitative BAN logic. It is also applied to the formal analysis and computation of a Radio Frequency Identification (RFID) authentication protocol to show how it works. The quantitative results on belief show that the proposed quantitative approach of BAN logic based on belief can more objectively reflect the security property of the authentication protocol.
KW - Authentication protocols
KW - BAN logic
KW - Belief logic
KW - Possibility computation
KW - Quantitative logic
KW - Security and privacy
UR - http://www.scopus.com/inward/record.url?scp=85145021093&partnerID=8YFLogxK
U2 - 10.1007/978-981-19-7510-3_2
DO - 10.1007/978-981-19-7510-3_2
M3 - Conference Proceeding
AN - SCOPUS:85145021093
SN - 9789811975097
T3 - Communications in Computer and Information Science
SP - 19
EP - 34
BT - Artificial Intelligence Logic and Applications - The 2nd International Conference, AILA 2022, Proceedings
A2 - Chen, Yixiang
A2 - Zhang, Songmao
PB - Springer Science and Business Media Deutschland GmbH
T2 - 2nd International Conference on Artificial Intelligence Logic and Applications, AILA 2022
Y2 - 26 August 2022 through 28 August 2022
ER -