共查询到20条相似文献,搜索用时 125 毫秒
1.
基于分层时间有色Petri网的支付协议公平性分析 总被引:2,自引:0,他引:2
电子支付协议是一种重要的电子商务协议,公平性是其重要的安全属性之一。该文提出一种基于分层时间有色Petri网(HTCPN)的电子支付协议形式化分析方法。该方法在进行公平性分析时,充分考虑了两个环境因素:主体是否诚实和通信信道是否可靠,与其他形式化方法相比,可以更有效地分析协议公平性。使用该方法对典型支付协议IBS协议进行分析,分析结果验证了所提模型和方法的有效性。 相似文献
2.
3.
4.
5.
6.
7.
为防止非法用户对配电网调度系统的恶意攻击,提出基于动态口令的配电网调度系统身份认证方案,确保配电网的安全稳定运行。采用挑战-应答协议生成动态口令,利用串空间模型优化该协议注册和登录阶段的约束条件,使其能够满足动态口令互认证的要求。口令生成后,在方案中融入失步调节机制,保证认证的高度同步性。通过Keyed MD5算法计算数据串的Hash值,获得客户端输入的散列值,将其与预存散列值对比,若二者一致,那么直接判定该用户为合法用户,反之则为非法用户。实验结果表明,所提方法的执行能力要优于传统方法且安全性能较高,实用性较强。 相似文献
8.
基于ATL的公平电子商务协议形式化分析 总被引:1,自引:0,他引:1
针对传统时序逻辑LTL,CTL及CTL*等把协议看成封闭系统进行分析的缺点,Kremer博士(2003)提出用一种基于博弈的ATL(Alternating-time Temporal Logic)方法分析公平电子商务协议并对几个典型的协议进行了公平性等方面的形式化分析。本文讨论了ATL逻辑及其在电子商务协议形式化分析中的应用,进一步扩展了Kremer博士的方法,使之在考虑公平性等特性的同时能够分析协议的安全性。最后本文用新方法对Zhou等人(1999)提出的 ZDB协议进行了严格的形式化分析,结果发现该协议在非保密通道下存在两个可能的攻击:保密信息泄露和重放攻击。 相似文献
9.
10.
11.
During the past few years, many near‐field communication (NFC) mobile payment protocols have been widely used and received more and more attentions. This could be an essential factor for the growth of the world economy and leads to the improvement of the quality of life for human beings. The NFC mobile payment is one prominent approach in allowing m‐commerce to conduct a sales transaction. However, fair exchange and information security are significant concerns in creating trust among the parties participating in the transaction. Many NFC mobile payment protocols have been introduced by researchers. But, most of them still lack some crucial properties of information security and fair exchange, and this can be an obstacle to their uses. In this article, we propose an NFC mobile payment protocol that possesses comprehensive properties of both information security and fair exchange for sales transaction processing. The protocol employs both symmetric and asymmetric encryptions, hash function, and the technique of offline session key generation, in order to improve the security while maintaining the lightweight property. The fairness analysis shows that the proposed protocol is more competent and effective than others. It can resolve any dispute in case one party misbehaves. Finally, the proposed protocol's security has been successfully verified using both Burrows, Abadi and Needham (BAN logic) and the Scyther tool. 相似文献
12.
基于PPV的公平移动支付协议 总被引:3,自引:0,他引:3
结合CEMBS的设计思想,在尽量满足移动网络特性的情况下,设计了一个能在移动终端观看视频服务的即看即付的公平协议.该协议在服务请求阶段通过利用CEMBS,在乐观情况下,可信第三方移动网络运营商不需参与,就可使互不信任的User与VASP完美地实现双方的认证与会话密钥协商,同时完成了服务请求的建立,双方均是不可否认的,且整个过程只需三条消息;在支付阶段,也可以保证双方公平地进行交易.通过分析,该协议满足公平性、不可否认、原子性、认证性以及保密性等一些必备性质,且协议比较简单,应用范围比较广泛. 相似文献
13.
14.
15.
对现有的各种公平交换协议进行了分类。利用公开可验证秘密共享原理、群加密方案,提出一 个新的基于离线半可信第三方的多方公平交换协议,离线第三方只在意外情况下才介入协议且其只能解密半个密钥分量,既保证了交换数据的机密性又实现了交易的真正公平,且交换的拓扑关系也对外(包括第三方) 保密。 相似文献
16.
17.
A buffer management algorithm for improving up/down transmission congestion protocol fairness in IEEE 802.11 wireless local area networks
下载免费PDF全文
![点击此处可从《International Journal of Communication Systems》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Jiawei Huang Jianxin Wang Jin Ye 《International Journal of Communication Systems》2014,27(10):2228-2240
The fair allocation of the resources is an important issue in wireless local area network (WLAN) because all wireless nodes compete for the same wireless radio channel. When uplink and downlink transmission congestion protocol (TCP) flows coexist in WLAN, the network service is biased toward the uplink TCP flows, and the downlink TCP flows tend to starve. In this article, we investigate the special up/down TCP unfairness problem and point out that the direct cause is the uplink acknowledgement (ACK) packets occupy most buffer space of access point. We thus propose a buffer management algorithm to ensure the fairness among uplink and downlink TCP flows. In order to limit the greedy behavior of ACK packets, the proposed algorithm adjusts the maximum size of buffer allocated for the ACK packets. Analysis and simulation results show that the proposed solution not only provides the fairness but also achieves 10–20% lower queue delay and higher network goodput than the other solutions. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
18.
1IntroductionAccelerated by the vigorous development of computernetworks ,electronic transaction has been widely appliedin al most eachfield of our daily life . The spreading ap-plication of electronic transactionis however not smoothas it is always accompanied by challenges ,such as thereliability of the parties involved,the equal position ofthe tradeoff members ,etc .This hasledto a great manyexchange protocols[1 ~6]attempting to pursue successfulcompletion of the exchange via Internet .Fai… 相似文献
19.
20.
A novel hybrid collision avoidance scheme that combines both sender-initiated and receiver-initiated collision-avoidance handshake is proposed for multi-hop ad hoc networks. The new scheme is compatible with the popular IEEE 802.11 MAC protocol and involves only some additional queue management and book-keeping work. Simulations of both UDP- and TCP-based applications are conducted with the IEEE 802.11 MAC protocol, a measurement-based fair scheme and the new scheme. It is shown that the new scheme can alleviate the fairness problem with almost no degradation in throughput. More importantly, it is shown that without explicit information exchange among nodes, the fairness problem cannot be solved conclusively if reasonable throughput is to be maintained. Hence it calls for further work to integrate the new collision avoidance scheme with other schemes that approximate fair queueing and use more contention information in channel access to achieve some QoS assurances in ad hoc networks. 相似文献