Verification of Authentication Protocols using SDL-method

نویسندگان

  • Javier Lopez
  • Juan J. Ortega
  • José M. Troya
چکیده

Authentication between protocol agents is widely studied in the cryptographic protocol analysis area. It is essential in a virtual environment to rely on protocol parties' identity. In the academic literature there are many protocols that provide the authentication property. We present in this paper a new mechanism to verify authentication using SDL, general purpose specification language. We have defined a generic schema in SDL that allow us to specify a security system and check system behavior when a malicious agent ( the intruder ) is present. We have used the EKE authentication protocol to illustrate who the mechanism works.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Automatic Functional Verification of OPNET Models with SDL-OPNET Co-Simulation

Owing to the model-driven development (MDD) technology, reliable network protocols could be developed with an integrated and systematic way. As performance, another core metric for evaluation of network protocols, is usually not the target of MDD process, how to connect performance evaluation to the MDD process is an important issue. This paper presents a method to enhance the reliability of pe...

متن کامل

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Status and Future of Quest 2.5 Using Quest for Protocol Evaluation 2.4 Overview of the Quest-tool

The current version of QUEST covers SDL'88 and part of SDL'92. Some new features of SDL'92 like priority input, value returning procedures, spontaneous transitions and different continuous signals with identical priority are supported by QUEST. In the future QUEST will provide improved front-and back ends. Furthermore we are doing research in the field of timed validation and verification that ...

متن کامل

Experience with Formal Verification of Sdl Protocols

This paper presents a case study in the application of formal methods to the verification of communication protocols. We analyze one component block of telephone switching software developed in the SDL language at Alcatel Network Systems Romania. We use the IF toolset from VERIMAG Grenoble to build a state-transition model of the system and verify selected properties. We present the steps perfo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002