2010
DOI: 10.1016/j.cose.2009.08.003
|View full text |Cite
|
Sign up to set email alerts
|

An intruder model with message inspection for model checking security protocols

Abstract: Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack actions against the ongoing protocol session(s). Any attempt to enumerate all messages that can be deduced by the intruder and the possible actions in all protocol steps results in an enormous branching of the model's state space. In current work, we introduce a new intruder model that can be exploited for state space reduction, opti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…Finally, we intend to provide support for additional nonfunctional requirements related to energy consumption() and security aspects. For the latter, it has been planned to extend the design flow with BIP components that model the security mechanisms of the Contiki OS for being able to identify vulnerabilities and verify the IoT system's protection against node spoofing attacks and denial of service attempts. In another perspective, it is worth to consider using the secure BIP extension as a means for the analysis and synthesis of security configurations in IoT applications that can ensure data and event noninterference…”
Section: Resultsmentioning
confidence: 99%
“…Finally, we intend to provide support for additional nonfunctional requirements related to energy consumption() and security aspects. For the latter, it has been planned to extend the design flow with BIP components that model the security mechanisms of the Contiki OS for being able to identify vulnerabilities and verify the IoT system's protection against node spoofing attacks and denial of service attempts. In another perspective, it is worth to consider using the secure BIP extension as a means for the analysis and synthesis of security configurations in IoT applications that can ensure data and event noninterference…”
Section: Resultsmentioning
confidence: 99%
“…A -> S: {Kab}_Kas S -> B: {Kab}_Kbs [18]. Support for other intruder models such as algebraic intruder model [11], message-based inspection model [7], and multiagent based systems semantics [25], can be integrated with AVISPA's communication channel in the future [30]. AVISPA's selection of this model is supported by the fact that this model can emulate the actions of an arbitrary adversary [12], and it is also very challenging because it gives advantage to the intruder as opposed to other models [12].…”
Section: High Level Protocol Specification Languagementioning
confidence: 99%
“…Considering the proposed flow for IoT systems, we intend to provide support for additional extra-functional requirements, related to energy consumption [136], [153] and security aspects. For the latter, it has been planned to extend the design flow with BIP components that model security mechanisms of the Contiki OS [154], for being able to identify vulnerabilities and verify the IoT system's protection against malicious attacks, such as node spoofing [155] and denial of service [156].…”
Section: Future Research Prospectsmentioning
confidence: 99%