Modeling and analysis of security protocols using role based specifications and Petri nets

被引:0
|
作者
Bouroulet, Roland [1 ]
Devillers, Raymond [2 ]
Klaudel, Hanna [3 ]
Pelz, Elisabeth [1 ]
Pommereau, Franck [1 ]
机构
[1] Univ Paris Est, LACL, 61 Av Gen Gaulle, F-94010 Creteil, France
[2] Univ Libre Bruxelles, Dept Informat, Brussels CP212, Belgium
[3] Univ Evry, IBISC, F-91025 Evry, France
来源
关键词
security protocols; formal specification; process algebras; Petri nets;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authentication) of security protocols. The protocol agents (e.g., an initiator, a responder, a server, a trusted third party, ...) are formalized as roles, each of them having a predefined behavior depending on their global and also local knowledge (including for instance public, private and shared keys), and may interact in a potentially hostile environment. The main characteristics of our framework, is that it makes explicit, structured and formal, the usually implicit information necessary to analyse the protocol, for instance the public and private context of execution. The roles and the environment are expressed using SPL processes and compositionally translated into high-level Petri nets, while the context specifying the global and local knowledge of the participants in the protocol is used to generate the corresponding initial marking (with respect to the studied property). Finally, this representation is used to analyse the protocol properties, applying techniques of simulation and model-checking on Petri nets. The complete approach is illustrated on the case study of the Kao-Chow authentication protocol.
引用
收藏
页码:72 / +
页数:3
相关论文
共 50 条
  • [1] Modeling and Analysis of Security Protocols Using Colored Petri Nets
    Xu, Yang
    Xie, Xiaoyao
    JOURNAL OF COMPUTERS, 2011, 6 (01) : 19 - 27
  • [2] Analysis of Concurrent Security Protocols Using Colored Petri Nets
    Long, Shigong
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 227 - 230
  • [3] MODELING OF COMMUNICATION PROTOCOLS BY USING PETRI NETS
    ILYAS, M
    KHALIL, H
    COMPUTERS & INDUSTRIAL ENGINEERING, 1986, 11 (1-4) : 547 - 551
  • [4] Modeling and Analysis of Authentication Protocols. Using Colored Petri Nets
    Xu, Yang
    Xie, Xiaoyao
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 443 - 448
  • [5] Considering Time in Formal Analysis of Security Protocols Using Colored Petri Nets
    Xu, Meng
    Su, Guiping
    Ding, Yanlan
    2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 63 - 68
  • [6] Software Security Modeling Based On Petri Nets
    Mohsenzadeh, A.
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2015, 15 (01): : 70 - 77
  • [7] Modeling and Analysis of Agent-Based Specifications of Security Protocols Using CSANs and PDETool
    Akbarzadeh, Mojtaba
    Azgomi, Mohammad Abdollahi
    2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2009, : 151 - 155
  • [8] Modeling and Simulating Interaction Protocols Using Nested Petri Nets
    Fernandez Venero, Mirtha Lina
    Correa da Silva, Flavio Soares
    SOFTWARE ENGINEERING AND FORMAL METHODS, 2014, 8368 : 135 - 150
  • [9] Analysis of Security Protocol Based on Petri Nets
    Liu, Fengli
    Han, Wei
    Jiang, Mingyue
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 48 - 51
  • [10] Colored Petri Nets Based Modeling of Information Flow Security
    Wu, Ruoyu
    Li, Weiguo
    Huang, He
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 681 - 684