Modeling and analysis of security protocols using role based specifications and Petri nets

被引:0
|
作者
Bouroulet, Roland [1 ]
Devillers, Raymond [2 ]
Klaudel, Hanna [3 ]
Pelz, Elisabeth [1 ]
Pommereau, Franck [1 ]
机构
[1] Univ Paris Est, LACL, 61 Av Gen Gaulle, F-94010 Creteil, France
[2] Univ Libre Bruxelles, Dept Informat, Brussels CP212, Belgium
[3] Univ Evry, IBISC, F-91025 Evry, France
来源
关键词
security protocols; formal specification; process algebras; Petri nets;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authentication) of security protocols. The protocol agents (e.g., an initiator, a responder, a server, a trusted third party, ...) are formalized as roles, each of them having a predefined behavior depending on their global and also local knowledge (including for instance public, private and shared keys), and may interact in a potentially hostile environment. The main characteristics of our framework, is that it makes explicit, structured and formal, the usually implicit information necessary to analyse the protocol, for instance the public and private context of execution. The roles and the environment are expressed using SPL processes and compositionally translated into high-level Petri nets, while the context specifying the global and local knowledge of the participants in the protocol is used to generate the corresponding initial marking (with respect to the studied property). Finally, this representation is used to analyse the protocol properties, applying techniques of simulation and model-checking on Petri nets. The complete approach is illustrated on the case study of the Kao-Chow authentication protocol.
引用
收藏
页码:72 / +
页数:3
相关论文
共 50 条
  • [11] SYSTEM MODELING AND ANALYSIS USING PETRI NETS
    OZSU, MT
    WONG, KL
    KOON, TM
    SYSTEMS ANALYSIS MODELLING SIMULATION, 1988, 5 (01): : 3 - 25
  • [12] Modeling and analysis of workflows using Petri Nets
    Adam, NR
    Atluri, V
    Huang, WK
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 1998, 10 (02) : 131 - 158
  • [13] Modeling and Analysis of Workflows Using Petri Nets
    Nabil R. Adam
    Vijayalakshmi Atluri
    Wei-Kuang Huang
    Journal of Intelligent Information Systems, 1998, 10 : 131 - 158
  • [14] Modeling and analysis using hybrid Petri nets
    Ghomri, Latefa
    Alla, Hassane
    NONLINEAR ANALYSIS-HYBRID SYSTEMS, 2007, 1 (02) : 141 - 153
  • [15] Modeling and analysis of workflows using Petri Nets
    Rutgers Univ, Newark, United States
    J Intell Inform Syst, 2 (131-158):
  • [16] Modeling and analysis of workflows using Petri Nets
    Adam, Nabil R.
    Atluri, Vijayalakshmi
    Huang, Wei-Kuang
    Journal of Intelligent Information Systems, 10 (02): : 131 - 158
  • [17] Analysis of two authorization protocols using Colored Petri Nets
    Younes Seifi
    Suriadi Suriadi
    Ernest Foo
    Colin Boyd
    International Journal of Information Security, 2015, 14 : 221 - 247
  • [18] Analysis of two authorization protocols using Colored Petri Nets
    Seifi, Younes
    Suriadi, Suriadi
    Foo, Ernest
    Boyd, Colin
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (03) : 221 - 247
  • [19] Formal modeling and analysis of security schemes of RPL protocol using colored Petri nets
    Ahmad, Farooq
    Chaudhry, Muhammad Tayyab
    Jamal, Muhammad Hasan
    Sohail, Muhammad Amar
    Gavilanes, Daniel
    Masias Vergara, Manuel
    Ashraf, Imran
    PLOS ONE, 2023, 18 (08):
  • [20] Modeling and Security Analysis of IEEE 802.1AS Using Hierarchical Colored Petri Nets
    Tang, Siyu
    Hu, Xiaoya
    Zhao, Lian
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,