HOME JOURNALS CONTACT

Information Technology Journal

Year: 2013 | Volume: 12 | Issue: 23 | Page No.: 7185-7192
DOI: 10.3923/itj.2013.7185.7192
Improvement of CMP1 Protocol and Analysis of Petri Net
Junmin Zhao, Yi He and Bei Lu

Abstract: In this study, the author conducts an in-depth research of the electronic commerce protocol CMP1 and finds the problem of redundant design of CMP1 protocol. Besides, the CMP1 protocol does not meet the requirements of fairness and timeliness and it is likely to suffer replay attack and problems like that. In view of the insufficiency of CMP1 protocol, this study puts forward the corresponding improvement scheme and put modifications on the protocol. The improved CMP1 protocol makes up for the previous flaws. Then, the color Petri net protocol analysis method is adopted to model and simulate the modified CMP1 protocol and the properties of the new protocol are analyzed as well. The simulation results prove that the improved protocol can not only meet the requirements of accountability, fairness and timeliness but also avoid the possibility of replay attack.

Fulltext PDF

How to cite this article
Junmin Zhao, Yi He and Bei Lu, 2013. Improvement of CMP1 Protocol and Analysis of Petri Net. Information Technology Journal, 12: 7185-7192.

Keywords: CMP1 protocol, color petri net, CPN tools and state analysis

REFERENCES

  • Deng, R.H., L. Gong, A.A. Lazar and W. Wang, 1996. Practical protocols for certified electronic mail. J. Network Syst. Manage., 4: 279-297.
    CrossRef    Direct Link    


  • Bolignano, D., 1997. Towards the formal verification of electronic commerce protocols. Proceedings of the 10th Computer Security Foundations Workshop, June 10-12, 1997, Rockport, MA, USA., pp: 133-146.


  • Lowe, G., 1996. Breaking and fixing the needham-schroeder public-key protocol using FDR. Proceedings of the 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems, March 27-29, 1996, Passau, Germany, pp: 147-166.


  • Lu, B., 2012. A method of analyzing e-commerce protocols based on colored petri nets. YanShan University, pp: 15-26.


  • Panagiotis, K., V. Odontidis and M. Gousidou-Koutita, 2005. Colored Petri Net based model checking and failure analysis for E-commerce protocols. Proceedings of the 6th Workshop and Tutorial on Practical Use of Colored Petri Nets and the CPN Tools, October 24-26, 2005, Aarhus, Denmark, pp: 267-283.


  • Qing, S.H., 2003. Twenty years development of security protocols research. J. Software, 14: 1740-1752.


  • Kailar, R., 1996. Accountability in electronic commerce protocols. IEEE Trans. Software Eng., 22: 313-328.
    CrossRef    Direct Link    


  • Gurgens, S., C. Rudolph and H. Vogt, 2005. On the security of fair non-repudiation protocols. Int. J. Inform. Security, 4: 253-262.
    CrossRef    Direct Link    


  • Lin, X. and D.M. Zhao, 2007. Limitations and improvement of CMP. Microcomput. Inform., 23: 32-33.


  • Xu, Y., X.Y. Xie and H.G. Zhang, 2011. Modeling and analysis of electronic commerce protocols using colored petri nets. J. Software, 6: 1181-1187.


  • Zhou, D.C., S.H. Qing and Z.F. Zhou, 2001. A new approach for the analysis of electronic commerce J. Software, 12: 1318-1328.

  • © Science Alert. All Rights Reserved