2011
DOI: 10.1016/j.cose.2011.02.001
|View full text |Cite
|
Sign up to set email alerts
|

Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach

Abstract: Formal analysis techniques, such as probabilistic model checking, offer an effective mechanism for model-based performance and verification studies of communication systems' behavior that can be abstractly described by a set of rules i.e., a protocol. This article presents an integrated approach for the quantitative analysis of the Certified E-mail Message Delivery (CEMD) protocol that provides security properties to electronic mail services. The proposed scheme employs a probabilistic model checking analysis … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 24 publications
0
11
0
Order By: Relevance
“…These results define cost in line with hardware specifications i.e. actual CPU cycles needed for RSA encryption and decryption operations, instead of clear numbers used in the model described in [14]. Thus, the new method constitutes a resource-aware approach towards studying protocols' cost under hardware specifications.…”
Section: Introductionmentioning
confidence: 60%
See 1 more Smart Citation
“…These results define cost in line with hardware specifications i.e. actual CPU cycles needed for RSA encryption and decryption operations, instead of clear numbers used in the model described in [14]. Thus, the new method constitutes a resource-aware approach towards studying protocols' cost under hardware specifications.…”
Section: Introductionmentioning
confidence: 60%
“…A primitive model of this idea was firstly proposed by the authors in [14]. This early work employs the Texas Instruments TMS320C55x Family operating at 200M Hz.…”
Section: Introductionmentioning
confidence: 99%
“…Quantitative verification has previously been applied to analyse dynamic power management schemes for mobile devices [43] and energy harvesters [46]. Here, we highlight a recent case study that applied quantitative verification with PRISM to analyse the computational and transmission cost of an electronic email protocol [4], with the view to provide tool-assisted systematic analysis of the protocol for a variety of mobile environments.…”
Section: Constrained Resourcesmentioning
confidence: 99%
“…The Certified E-mail Message Delivery (CEMD) protocol studied in [4] is used on mobile devices such as smartphones and PDAs, including low-cost hardware, frequently operating in noisy environments with high bit error rate. The CEMD protocol provides a number of security features, such as fairness (neither sender nor recipient should gain advantage upon interruption), timeliness (all participants should be able to exit the protocol in a given finite time), and confidentiality (only the intended participant should learn the contents of an email message, implemented using RSA encryption).…”
Section: Constrained Resourcesmentioning
confidence: 99%
“…Because of the popularity, e-mail systems become an adversary's or a malicious user's targets. Among e-mail security issues, basic and primary concerns are e-mails' confidentiality and authentication [1]. Some of data cryptosystems can satisfy these concerns.…”
Section: Introductionmentioning
confidence: 99%