2020
DOI: 10.1016/j.procs.2020.03.449
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification of Secure Evidence Collection Protocol using BAN Logic and AVISPA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(12 citation statements)
references
References 6 publications
0
12
0
Order By: Relevance
“…Figure 8 shows the AVISPA tool architecture. To start, a text is written in CAS+ language and given as input to SPAN, which in turn will convert it to an HLPSL text [ 34 ]. Then, this text is entered into the intermediate format (IF) translator, which in turn directly converts it to an intermediate format (IF) by using the translator HLPSL2IF [ 34 ].…”
Section: The Implementation and Evaluation Of The Proposed Lightweigh...mentioning
confidence: 99%
See 3 more Smart Citations
“…Figure 8 shows the AVISPA tool architecture. To start, a text is written in CAS+ language and given as input to SPAN, which in turn will convert it to an HLPSL text [ 34 ]. Then, this text is entered into the intermediate format (IF) translator, which in turn directly converts it to an intermediate format (IF) by using the translator HLPSL2IF [ 34 ].…”
Section: The Implementation and Evaluation Of The Proposed Lightweigh...mentioning
confidence: 99%
“…To start, a text is written in CAS+ language and given as input to SPAN, which in turn will convert it to an HLPSL text [ 34 ]. Then, this text is entered into the intermediate format (IF) translator, which in turn directly converts it to an intermediate format (IF) by using the translator HLPSL2IF [ 34 ]. Then, it analyzes it by using one of four backends existing in the AVISPA tool: the on-the-fly model-checker (OFMC), the constraint-logic-based attack searcher (CLAtSe), the satisfiability-based model-checker (SATMC), and the tree automata based on automatic approximations for the analysis of security protocols (TA4SP) [ 34 , 35 ].…”
Section: The Implementation and Evaluation Of The Proposed Lightweigh...mentioning
confidence: 99%
See 2 more Smart Citations
“…This diagram proves that the whole protocol is readable by the verifications and that the security verifications cover the whole protocol. we moved then to launch the security verifications by the OFMC, and ATSE [22] Fig. 6.…”
Section: Security Analysismentioning
confidence: 99%