Improving the security of industrial networks by means of formal verification

被引:5
|
作者
Bertolotti, Ivan Cibrario [1 ]
Durante, Luca [1 ]
Maggi, Paolo [1 ]
Sisto, Riccardo [1 ]
Valenzano, Adriano [1 ]
机构
[1] Politecn Torino, CNR, IEIIT, I-10129 Turin, Italy
关键词
protocol verification; formal methods; network-level security and protection;
D O I
10.1016/j.csi.2006.06.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Computer networks are exposed to serious security threats that can even have catastrophic consequences from both the points of view of economy and safety if such networks control critical infrastructures, such as for example industrial plants. Security must then be considered as a fundamental issue starting from the earlier phases of the design of a system, and suitable techniques and tools should be adopted to satisfy the security-related requirements. The focus of this paper is on how formal methods can help in analysing the standard cryptographic protocols used to implement security-critical services such as authentication and secret keys distribution in critical environments. The analysis of the 802.11 shared key authentication protocol by S(3)A, a fully automatic software tool that is based on a formal approach, is illustrated as a case study, which also highlights the peculiarities of analysing protocols based on wireless channels. (C) 2006 Elsevier B.V All rights reserved.
引用
收藏
页码:387 / 397
页数:11
相关论文
共 50 条
  • [1] Security in Wireless Sensor Networks: A formal verification of protocols
    Nandi, Giann Spilere
    Pereira, David
    Vigil, Martin
    Moraes, Ricardo
    Morales, Analucia Schiaffino
    Araujo, Gustavo
    [J]. 2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 425 - 431
  • [2] Formal Verification of Security Policy Implementations in Enterprise Networks
    Bera, P.
    Ghosh, S. K.
    Dasgupta, Pallab
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 117 - +
  • [3] Improving simulation-based verification by means of formal methods
    Fey, G
    Drechsler, R
    [J]. ASP-DAC 2004: PROCEEDINGS OF THE ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, 2004, : 640 - 643
  • [4] Improving the Formal Verification of Reachability Policies in Virtualized Networks
    Bringhenti, Daniele
    Marchetto, Guido
    Sisto, Riccardo
    Spinoso, Serena
    Valenza, Fulvio
    Yusupov, Jalolliddin
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (01): : 713 - 728
  • [5] Formal Security Verification of Transport Protocols for Wireless Sensor Networks
    Vinh-Thong Ta
    Dvir, Amit
    Buttyan, Levente
    [J]. ADVANCED COMPUTATIONAL METHODS FOR KNOWLEDGE ENGINEERING, 2014, 282 : 389 - 403
  • [6] Formal Specification and Verification of Security Guidelines
    Zhioua, Zeineb
    Roudier, Yves
    Ameur, Rabea Boulifa
    [J]. 2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017), 2017, : 267 - 273
  • [7] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [8] Formal Verification and Visualization of Security Policies
    Wahsheh, Luay A.
    de Leon, Daniel Conte
    Alves-Foss, Jim
    [J]. JOURNAL OF COMPUTERS, 2008, 3 (06) : 22 - 31
  • [9] Challenges for formal verification in industrial setting
    Slobodova, Anna
    [J]. FORMAL METHODS: APPLICATIONS AND TECHNOLOGY, 2007, 4346 : 1 - 22
  • [10] Formal Methods for Industrial Interlocking Verification
    Chadwick, Simon
    James, Phillip
    Roggenbach, Markus
    Werner, Tom
    [J]. 2018 INTERNATIONAL CONFERENCE ON INTELLIGENT RAIL TRANSPORTATION (ICIRT), 2018,