Communication space reduction for formal verification of secure authentication protocols

被引:0
|
作者
Kim, K [1 ]
Abraham, JA [1 ]
机构
[1] Univ Texas, Comp Engn Res Ctr ACE 6 134, Austin, TX 78712 USA
关键词
D O I
10.1109/WECWIS.2001.933928
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the share of electronic transactions in commerce grows, the role of the authentication protocol becomes more important. However it is yen, important to ensure that no errors exist in these protocols. Formal methods are a good approach to validate the properties of authentication protocols. Among them, model checking is one of the preferred methods since it can be done automatically. Although protocol designers can use model checking to evaluate their protocols, they, cannot verify all the desired properties completely using this approach because the state space of communication systems cannot be limited. It is, therefore, important to develop techniques to reduce the space of proposed protocols so that model checkers can be used to validate theta. We propose a new space reduction method for validating authentication correctness to support model checking, which is simple and provides tight bounds on the state space.
引用
收藏
页码:225 / 227
页数:3
相关论文
共 50 条
  • [1] FORMAL SPECIFICATION AND VERIFICATION OF SECURE COMMUNICATION PROTOCOLS
    KNAPSKOG, SJ
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 58 - 73
  • [2] Formal verification of secure group communication protocols modelled in UML
    de Saqui-Sannes, P.
    Villemur, T.
    Fontan, B.
    Mota, S.
    Bouassida, M. S.
    Chridi, N.
    Chrisment, I.
    Vigneron, L.
    [J]. INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2010, 6 (1-2) : 125 - 133
  • [3] An Approach for Formal Verification of Authentication Protocols
    A. M. Mironov
    [J]. Lobachevskii Journal of Mathematics, 2022, 43 : 443 - 454
  • [4] An Approach for Formal Verification of Authentication Protocols
    Mironov, A. M.
    [J]. LOBACHEVSKII JOURNAL OF MATHEMATICS, 2022, 43 (02) : 443 - 454
  • [5] Formal Verification of Secure Forwarding Protocols
    Klenze, Tobias
    Sprenger, Christoph
    Basin, David
    [J]. 2021 IEEE 34TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2021), 2021, : 313 - 328
  • [6] Formal automatic verification of authentication cryptographic protocols
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    [J]. FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
  • [7] A State Space Suppression Method for Formal Verification of Secure Routing Protocols With SPIN
    Kojima, Hideharu
    Yanai, Naoto
    [J]. 2019 IEEE 30TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2019), 2019, : 124 - 125
  • [8] An Improved Secure Authentication Protocol for WiMAX with Formal Verification
    Rai, Anjani Kumar
    Mishra, Shivendu
    Tripathi, Pramod Narayan
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 407 - +
  • [9] Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN)
    Singh, Ninni
    Saini, Hemraj
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 375 - 388
  • [10] Verification of authentication protocols for mobile satellite communication systems
    Abouhogail, Reham Abdellatif
    [J]. EGYPTIAN JOURNAL OF REMOTE SENSING AND SPACE SCIENCES, 2014, 17 (02): : 171 - 177