2008
DOI: 10.1007/978-3-540-68746-7_9
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets

Abstract: In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authentication) of security protocols. The protocol agents (e.g., an initiator, a responder, a server, a trusted third party,. . .) are formalized as roles, each of them having a predefined behavior depending on their global and also local knowledge (including for instance public, private and shared keys), and may interact in a potentially hostile en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…Many model checking methods [6][7][8][9][10][11][12][13][14][15][16] have been developed and applied to analyze cryptographic protocols. All of them except for NRL [15] and Proverif [16] can analyze only one attack trace of a found attack.…”
Section: Model Checking For Cryptographic Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Many model checking methods [6][7][8][9][10][11][12][13][14][15][16] have been developed and applied to analyze cryptographic protocols. All of them except for NRL [15] and Proverif [16] can analyze only one attack trace of a found attack.…”
Section: Model Checking For Cryptographic Protocolsmentioning
confidence: 99%
“…In [11,12], Murphi which is a general model checker has also been applied to cryptographic protocols, and it discovered new attacks in some protocols. In [13][14], Petri nets-based model checking methods are employed to analyze cryptographic protocols, and they can detect known attacks only. All of the model checking methods discussed so far can analyze only one attack trace of a found attack.…”
Section: Model Checking For Cryptographic Protocolsmentioning
confidence: 99%
“…Bouroulet et al [10] developed a specification language and verification for security protocols. A security protocol and attackers are specified by a language based on process algebra.…”
Section: Existing Petri Nets Methods For Cryptographic Protocolsmentioning
confidence: 99%
“…Most Petri nets-based methods [38,26,1,17,10,27] that have been developed to analyze cryptographic protocols provide the analysis of one attack trace only. But, there is one Petri-nets-based method [25] which offers the analysis of multiple attack traces, but it is inefficient.…”
Section: Introductionmentioning
confidence: 99%
“…Similar works include the specification and analysis of simpler security protocols using a Petri net semantics of the Security Protocol Language (SPL [4]): [3,2]. SPL is not suitable to model SPREADS' protocol because it lacks features that turned out to be crucial for our modelling: in particular, the ability to model loops and choices in conjunction with the annotation of the model with complex data types and associated functions.…”
Section: Related Workmentioning
confidence: 99%