Junmin Zhao
Institute of Computer Science and Engineering, Henan University of Urban Construction, Pingdingshan, China
Yi He
Institute of Computer Science and Engineering, Henan University of Urban Construction, Pingdingshan, China
Bei Lu
Jiao Zuo Tian Yi Technology Co. Ltd, Jiaozuo, China
ABSTRACT
In this study, the author conducts an in-depth research of the electronic commerce protocol CMP1 and finds the problem of redundant design of CMP1 protocol. Besides, the CMP1 protocol does not meet the requirements of fairness and timeliness and it is likely to suffer replay attack and problems like that. In view of the insufficiency of CMP1 protocol, this study puts forward the corresponding improvement scheme and put modifications on the protocol. The improved CMP1 protocol makes up for the previous flaws. Then, the color Petri net protocol analysis method is adopted to model and simulate the modified CMP1 protocol and the properties of the new protocol are analyzed as well. The simulation results prove that the improved protocol can not only meet the requirements of accountability, fairness and timeliness but also avoid the possibility of replay attack.
PDF References Citation
How to cite this article
Junmin Zhao, Yi He and Bei Lu, 2013. Improvement of CMP1 Protocol and Analysis of Petri Net. Information Technology Journal, 12: 7185-7192.
DOI: 10.3923/itj.2013.7185.7192
URL: https://scialert.net/abstract/?doi=itj.2013.7185.7192
DOI: 10.3923/itj.2013.7185.7192
URL: https://scialert.net/abstract/?doi=itj.2013.7185.7192
REFERENCES
- Deng, R.H., L. Gong, A.A. Lazar and W. Wang, 1996. Practical protocols for certified electronic mail. J. Network Syst. Manage., 4: 279-297.
CrossRefDirect Link - Bolignano, D., 1997. Towards the formal verification of electronic commerce protocols. Proceedings of the 10th Computer Security Foundations Workshop, June 10-12, 1997, Rockport, MA, USA., pp: 133-146.
CrossRef - Kailar, R., 1996. Accountability in electronic commerce protocols. IEEE Trans. Software Eng., 22: 313-328.
CrossRefDirect Link - Gurgens, S., C. Rudolph and H. Vogt, 2005. On the security of fair non-repudiation protocols. Int. J. Inform. Security, 4: 253-262.
CrossRefDirect Link