Verification of the TESLA protocol in MCMAS-X

نویسندگان

  • Alessio Lomuscio
  • Franco Raimondi
  • Bozena Wozna
چکیده

We use MCMAS-X to verify authentication properties in the TESLA secure stream protocol. MCMAS-Xis an extension to explicit and deductive knowledge of the OBDD-based model checker MCMAS a verification tool for multi-agent systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Automated Verification of Quantum Protocols using MCMAS

We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems [17]. The method is based on the logical framework developed by D’Hondt and Panangaden [10] for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC) [9], an extension of the Measureme...

متن کامل

Uncertainty Analysis in MRI-based Polymer Gel Dosimetry

Background: Polymer gel dosimeters combined with magnetic resonance imaging (MRI) can be used for dose verification of advanced radiation therapy techniques. However, the uncertainty of dose map measured by gel dosimeter should be known. The purpose of this study is to investigate the uncertainty related to calibration curve and MRI protocol for MAGIC (Methacrylic and Ascorbic acid in Gelatin I...

متن کامل

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

An Environment for the Specification and Verification of Time-dependent Security Protocols

The use of formal methods in software engineering for the specification and the verification is suitable when developing complex systems. The distributed nature, the subtle time dependence and the strict requirements of time sensitive security protocols increase the inherent complexity of their validation. Using the TESLA authentication protocol as a case study, we shall discuss what are the fu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Fundam. Inform.

دوره 79  شماره 

صفحات  -

تاریخ انتشار 2007