Modeling and Analysis of Agent-Based Specifications of Security Protocols Using CSANs and PDETool

被引:0
|
作者
Akbarzadeh, Mojtaba [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran, Iran
关键词
FRAMEWORK;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Coloured stochastic activity networks (CSANs) are a useful formalism for modeling and analysis of computer systems and networks. PDETool is a new powerful modeling tool that supports CSANs. This paper is an attempt to propose a new approach for modeling and automatic verification of security protocols using CSANs and PDETool. In the proposed approach, the existing agents in the protocol are expressed formally as roles using the security protocols language (SPL) and then are modeled by CSANs. The approach has three steps. Firstly, the security protocol will be modeled regardless of the existence of any intruder. Secondly, different potential intruders will be modeled. Finally, by state space analysis of the model, the possibility of any security flaw in the protocol will be checked. As a case study, the Needham-Schroder and TMN protocols have been modeled and verified.
引用
收藏
页码:151 / 155
页数:5
相关论文
共 50 条
  • [1] Modeling and analysis of security protocols using role based specifications and Petri nets
    Bouroulet, Roland
    Devillers, Raymond
    Klaudel, Hanna
    Pelz, Elisabeth
    Pommereau, Franck
    [J]. APPLICATIONS AND THEORY OF PETRI NETS, 2008, 5062 : 72 - +
  • [2] Compositional refinement in agent-based security protocols
    McIver, A. K.
    Morgan, C. C.
    [J]. FORMAL ASPECTS OF COMPUTING, 2011, 23 (06) : 711 - 737
  • [3] Agent-Based Modeling of User Circumvention of Security
    Kothari, Vijay
    Blythe, Jim
    Smith, Sean
    Koppel, Ross
    [J]. 1ST INTERNATIONAL WORKSHOP ON AGENTS & CYBERSECURITY, 2014,
  • [4] Agent-Based Modeling of Blockchain Decentralized Financial Protocols
    Struchkov, Igor
    Lukashin, Alexey
    Kuznetsov, Bogdan
    Mikhalev, Igor
    Mandrusova, Zoia
    [J]. PROCEEDINGS OF THE 2021 29TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), VOL 1, 2021, : 337 - 343
  • [5] Pedestrian Attribute Analysis Using Agent-Based Modeling
    Shaaban, Khaled
    Abdelwarith, Karim
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (14):
  • [6] Analysis of Authentication Protocols in Agent-Based Systems Using Labeled Tableaux
    Ma, Ji
    Orgun, Mehmet A.
    Sattar, Abdul
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2009, 39 (04): : 889 - 900
  • [7] Conversation protocols:: Modeling and implementing conversations in agent-based systems
    Martin, FJ
    Plaza, E
    Rodríguez-Aguilar, JA
    [J]. ISSUES IN AGENT COMMUNICATION, 2000, 1916 : 249 - 263
  • [8] Agent-based communication security
    Pimentao, JP
    Sousa, PAC
    Amaral, P
    Steiger-Garcao, A
    [J]. MULTIAGENT SYSTEM TECHNOLOGIES, PROCEEDINGS, 2004, 3187 : 73 - 84
  • [9] An agent-based approach using the ebXML specifications for E-business
    Boughaci, D
    Drias, H
    [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 766 - 767
  • [10] Automated Modeling and Analysis of Agent-based Simulations using the CASE Framework
    Decraene, James
    Low, Malcolm Yoke Hean
    Zeng, Fanchao
    Zhou, Suiping
    Cai, Wentong
    [J]. 11TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION (ICARCV 2010), 2010, : 346 - 351