Modeling and analysis of security protocols using role based specifications and Petri nets

被引:0
|
作者
Bouroulet, Roland [1 ]
Devillers, Raymond [2 ]
Klaudel, Hanna [3 ]
Pelz, Elisabeth [1 ]
Pommereau, Franck [1 ]
机构
[1] Univ Paris Est, LACL, 61 Av Gen Gaulle, F-94010 Creteil, France
[2] Univ Libre Bruxelles, Dept Informat, Brussels CP212, Belgium
[3] Univ Evry, IBISC, F-91025 Evry, France
来源
关键词
security protocols; formal specification; process algebras; Petri nets;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authentication) of security protocols. The protocol agents (e.g., an initiator, a responder, a server, a trusted third party, ...) are formalized as roles, each of them having a predefined behavior depending on their global and also local knowledge (including for instance public, private and shared keys), and may interact in a potentially hostile environment. The main characteristics of our framework, is that it makes explicit, structured and formal, the usually implicit information necessary to analyse the protocol, for instance the public and private context of execution. The roles and the environment are expressed using SPL processes and compositionally translated into high-level Petri nets, while the context specifying the global and local knowledge of the participants in the protocol is used to generate the corresponding initial marking (with respect to the studied property). Finally, this representation is used to analyse the protocol properties, applying techniques of simulation and model-checking on Petri nets. The complete approach is illustrated on the case study of the Kao-Chow authentication protocol.
引用
收藏
页码:72 / +
页数:3
相关论文
共 50 条
  • [21] Towards a Methodology for Modeling Deontic Protocols Using the Organizational Petri Nets Formalism
    Combettes, Stephanie
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2009, 5559 : 589 - 598
  • [22] Modeling and quantitatively predicting software security based on stochastic Petri nets
    Yang, Nianhua
    Yu, Huiqun
    Qian, Zhilin
    Sun, Hua
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 102 - 112
  • [23] Modelling and analysis of agent protocols with Petri nets
    Lehmann, K
    Moldt, D
    MULTIAGENT SYSTEM TECHNOLOGIES, PROCEEDINGS, 2004, 3187 : 85 - 98
  • [24] Petri Nets Based Verification of Epistemic Logic and Its Application on Protocols of Privacy and Security
    He, Leifeng
    Liu, Guanjun
    2020 IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2020, : 25 - 28
  • [25] TRANSFORMATIONAL IMPLEMENTATION OF PAISLEY SPECIFICATIONS USING PETRI NETS
    SACHA, KM
    SOFTWARE ENGINEERING JOURNAL, 1992, 7 (03): : 191 - 204
  • [26] Synthesis and Analysis of Petri Nets from Causal Specifications
    Oliveira, Mateus de Oliveira
    COMPUTER AIDED VERIFICATION (CAV 2022), PT II, 2022, 13372 : 447 - 467
  • [27] Modeling and analysis using Petri nets for semiconductor fabrication
    Jeng, MD
    Xie, XL
    1998 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5, 1998, : 692 - 697
  • [28] Modeling and analysis of remote diagnosis using Petri Nets
    Chen Lin
    Wei Shutao
    Xie Xiaowen
    2007 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS, VOLS 1-5, 2007, : 2133 - +
  • [29] Modeling and Analysis of Workflow Integration Using Petri Nets
    Yamaguchi, Shingo
    Watanabe, Yuki
    Tanaka, Minoru
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2010, 13 (03): : 673 - 680
  • [30] Correctness analysis of snoopy cache coherence protocols using Petri nets
    Hassan, A
    Mahgoub, I
    INTERNATIONAL SOCIETY FOR COMPUTERS AND THEIR APPLICATIONS 10TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 1997, : 338 - 343