2010 International Conference on Computational Intelligence and Software Engineering 2010
DOI: 10.1109/wicom.2010.5601245
|View full text |Cite
|
Sign up to set email alerts
|

Model Checking of Needham-Schroeder Protocol Using UPPAAL

Abstract: Currently, formal methods are the mainstream methods of cryptographic protocol analysis. Typically, these most used approaches for the protocols analysis do not take time into account, and this choice simplifies the analysis. However, cryptographic protocols like distributed programs in general are sensitive to the passage of time. A method for the protocols that are aware of timing aspects is presented using a model checker of formal methods based on timed automata, UPPAAL. We study a simplified version of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Authentication: Every Resource needs to authenticate itself before it can be allocated to a mission. The authentication process follows a simplified version of Needham-Schroeder protocol adopted from [19]. There are two participants in the protocol: A -the initiator, and B -the responder.…”
Section: Case Study -Crisis Management Systemmentioning
confidence: 99%
“…Authentication: Every Resource needs to authenticate itself before it can be allocated to a mission. The authentication process follows a simplified version of Needham-Schroeder protocol adopted from [19]. There are two participants in the protocol: A -the initiator, and B -the responder.…”
Section: Case Study -Crisis Management Systemmentioning
confidence: 99%