Dissertation > Excellent graduate degree dissertation topics show

On the Model Checking and Design of Mobile Electronic Commerce Protocols

Author: LiuXia
Tutor: GuTianLong
School: Guilin University of Electronic Science and Technology
Course: Applied Computer Technology
Keywords: mobile electronic commerce protocol wireless authentication protocol formal analysis model checking
CLC: TP393.04
Type: Master's thesis
Year: 2006
Downloads: 213
Quote: 0
Read: Download Dissertation


At present,mobile electronic commerce is taking on extremely driving impetus all over the world and it is developing rapidly in our country too.Security is the most important problem when people use mobile electronic commmerce.The security of mobile electronic commmerce protocol is one of the important aspects of the security of mobile electronic commmerce.Mobile electronic commerce protocol is a special kind of electronic commerce protocols.Compared with traditional electronic commerce protocols,the environment of mobile electronic commerce protocol is more complicated because of the characteristics of mobile devices and wireless networks,which mades it more error-prone and brings new challenges for its formal analysis and design.This dissertation studys the model checking and design of mobile electronic commerce protocols(including wireless authentication protocol for it is the basis of mobile electronic commerce protocols).The main results that the author obtained are as follows:(1)Wireless authentication protocol Server-specific MAKEP is analyzed using symbolic model checker—SMV.The existing authentication flaw of the protocol is discovered and the effect of the flaw is discussed.(2)For the existing authentication flaw of Server-specific MAKEP,an improvement is given and the improved protocol is analyzed using model checking too.The result shows that the improved protocol satisfies the security goals.(3)For mobile electronic commerce protocols, a modeling method based on finite automata is proposed.Using this method,a typical mobile payment protocol KSL is analyzed as an example.The fairness flaw of the protocol is discoverd and an improvement is given.(4)For the characteristics of mobile devices and wireless networks,a fair payment protocol in mobile environment is designed.Some properties such as fairness,confidentiality and timeliness of the protocol are verified using model checking.The result shows the feasibility of the protocol.

Related Dissertations

  1. Research on the Methods for Detecting Mismatch of Web Services Based on Bounded Model Checking,TP311.52
  2. Research on Security of E-Commerce Protocols Based on UPPAAL,TP393.08
  3. Timed automata model - based verification techniques,TP301.1
  4. Research on Model Checking Algorithms of Ambients Calculi Systems,TP274
  5. Research and Implementation of the Platform of Unified Authentication and Authorization in Education Information Network,TP393.08
  6. Research and Implement on Static Malware Detection System Based on Program Semantics,TP393.08
  7. Research on Universal Access Authentication Protocol of Heterogeneous Wireless Integrated Networks,TN92
  8. Simulation and Analysis of Schedule Strategy of Reconfigrable HW System,TN791
  9. Research on Automaitc Analysis of Security Protocols Based on Strand Space Model,TP393.08
  10. Management and Discovery Research of the Semantic Web Services Based on Concept Lattice,TP393.09
  11. The Application Study on Formalism of Multi-Party Non-repudiation Protocols on SVO Logic,TP393.08
  12. Towards the Verification of Services Collaboration Based on Model Checking,TP311.52
  13. Tamping Load Experiment and Checking Analysis for 5.5m Stamping Charging Car,TQ520.5
  14. Application of Linear Temporal Logic on Audit of Unemployment Insurance,TP399-C2
  15. Research on Formal Analysis Methods of Security Protocols Based on Strand Space Model,TP393.08
  16. Research and Implement on Modeling Tool of Cooperative Trade Flow Based on WS-CDL,TP393.09
  17. Research on Password-Based Authentication and Key Exchange Protocol for Low Power Devices,TP393.08
  18. Based on the design and implementation of model checking , model-driven development system,TP311.52
  19. Research on Symbolic Model-Checking Algorithms,TP311.52
  20. A BPEL Program Verification Method Research Based on Mealy Machine,TP311.52
  21. Research of Software Security Analysis Based on Model Checking,TP311.52

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Communication protocols, communication protocols
© 2012 www.DissertationTopic.Net  Mobile