Communication space reduction for formal verification of secure authentication protocols

被引:0
|
作者
Kim, K [1 ]
Abraham, JA [1 ]
机构
[1] Univ Texas, Comp Engn Res Ctr ACE 6 134, Austin, TX 78712 USA
关键词
D O I
10.1109/WECWIS.2001.933928
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the share of electronic transactions in commerce grows, the role of the authentication protocol becomes more important. However it is yen, important to ensure that no errors exist in these protocols. Formal methods are a good approach to validate the properties of authentication protocols. Among them, model checking is one of the preferred methods since it can be done automatically. Although protocol designers can use model checking to evaluate their protocols, they, cannot verify all the desired properties completely using this approach because the state space of communication systems cannot be limited. It is, therefore, important to develop techniques to reduce the space of proposed protocols so that model checkers can be used to validate theta. We propose a new space reduction method for validating authentication correctness to support model checking, which is simple and provides tight bounds on the state space.
引用
收藏
页码:225 / 227
页数:3
相关论文
共 50 条
  • [31] A Formal Description and Verification of Authentication Protocol
    Yuan, Zhanting
    Kang, Xu
    Zhang, Qiuyu
    Liang, Shuang
    [J]. DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 735 - 740
  • [32] Secure Communication Protocols for SCADA Systems: Analysis and Comparisons of Different Secure Communication Protocols
    Aboulsamh, Rana Mohammed
    Albugaey, Maryam Tariq
    Alghamdi, Dana Omar
    Abujaid, Fatima Hussain
    Alsubaie, Sarah Nasser
    Saqib, Nazar Abbas
    [J]. PROCEEDINGS 2024 SEVENTH INTERNATIONAL WOMEN IN DATA SCIENCE CONFERENCE AT PRINCE SULTAN UNIVERSITY, WIDS-PSU 2024, 2024, : 209 - 214
  • [33] Formal verification of mobile robot protocols
    Béatrice Bérard
    Pascal Lafourcade
    Laure Millet
    Maria Potop-Butucaru
    Yann Thierry-Mieg
    Sébastien Tixeuil
    [J]. Distributed Computing, 2016, 29 : 459 - 487
  • [34] Formal verification of dependable distributed protocols
    Sinha, P
    Ren, DQ
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2003, 45 (12) : 873 - 888
  • [35] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [36] Formal verification of mobile robot protocols
    Berard, Beatrice
    Lafourcade, Pascal
    Millet, Laure
    Potop-Butucaru, Maria
    Thierry-Mieg, Yann
    Tixeuil, Sebastien
    [J]. DISTRIBUTED COMPUTING, 2016, 29 (06) : 459 - 487
  • [37] Authentication and Secure Robot Communication
    Yfantis, Evangelos A.
    Fayed, Ahmad
    [J]. INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2014, 11
  • [38] Formal verification of cryptographic protocols: A survey
    Meadows, CA
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 135 - 150
  • [39] Formal verification of delayed consistency protocols
    Pong, F
    Dubois, M
    [J]. 10TH INTERNATIONAL PARALLEL PROCESSING SYMPOSIUM - PROCEEDINGS OF IPPS '96, 1996, : 124 - 131
  • [40] Formal compliance verification of interface protocols
    Yang, YC
    Huang, JD
    Yen, CC
    Shih, CH
    Jou, JY
    [J]. 2005 IEEE VLSI-TSA INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION & TEST (VLSI-TSA-DAT), PROCEEDINGS OF TECHNICAL PAPERS, 2005, : 12 - 15