TIMED MODELS OF SECURITY PROTOCOLS INCLUDING DELAYS IN THE NETWORK

被引:7
|
作者
Szymoniak, Sabina [1 ]
Kurkowski, Miroslaw [2 ]
Piatkowski, Jacek [1 ]
机构
[1] Czestochowa Tech Univ, Inst Comp & Informat Sci, Czestochowa, Poland
[2] Cardinal Stefan Wyszynski Univ, Inst Comp Sci, Warsaw, Poland
关键词
computer science; mathematical models;
D O I
10.17512/jamcm.2015.3.14
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
A very important part of the network and computer systems is to ensure an appropriate level of information transmission security. Security is based primarily on properly selected communication in security protocol. Unfortunately, the time-dependent protocols are vulnerable to attacks; therefore there is a need to verify these protocols. For verification purposes, protocols can be modeled using timed automata. During the modeling and verification of the protocols, one should also keep in mind delays in the network. So far, delays in the network were not modeled.
引用
收藏
页码:127 / 139
页数:13
相关论文
共 50 条
  • [1] Network's Delays in Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, ISAT 2018, PT I, 2019, 852 : 19 - 29
  • [2] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
  • [3] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [4] TAuth: Verifying Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2014, 2014, 8829 : 300 - 315
  • [5] Verifying Parameterized Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    [J]. FM 2015: FORMAL METHODS, 2015, 9109 : 342 - 359
  • [6] Timed Automata Based Model Checking of Timed Security Protocols
    Kurkowski, Miroslaw
    Penczek, Wojciech
    [J]. FUNDAMENTA INFORMATICAE, 2009, 93 (1-3) : 245 - 259
  • [7] Modelling and checking timed authentication of security protocols
    Jakubowska, Gizela
    Penczek, Wojciech
    [J]. FUNDAMENTA INFORMATICAE, 2007, 79 (3-4) : 363 - 378
  • [8] Timed mobile ambients for network protocols
    Aman, Bogdan
    Ciobanu, Gabriel
    [J]. FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2008, 2008, 5048 : 234 - 250
  • [9] A Formal Specification and Verification Framework for Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Sun, Meng
    Dong, Jin-Song
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 44 (08) : 725 - 746
  • [10] Automated Verification of Timed Security Protocols with Clock Drift
    Li, Li
    Sun, Jun
    Dong, Jin Song
    [J]. FM 2016: FORMAL METHODS, 2016, 9995 : 513 - 530