A Coloured Petri Net Methodology and Library for Security Analysis of Network Protocols

نویسندگان

  • San Choosang
  • Steven Gordon
چکیده

Formal methods are often used to prove properties of network protocols, including required security properties. However for a protocol modeller the techniques available for security analysis often require expert knowledge of the technique. Also the tight coupling of protocol model and security attacks limit re-use of models. With Coloured Petri nets as the selected formal method, this paper proposes a methodology to support a modeller in performing security analysis of a protocol. The methodology enhances the re-usability, extendability and readability of protocol and attack models, with the aim of simplifying the tasks of the modeller. Key to the methodology is the decoupling of the protocol and attack models by using the hierarchical structure of Coloured Petri nets. Also a library of attack modules is developed based on Dolev-Yao assumptions; the modules can be composed to create complex attacks and re-used across different protocols. To demonstrate the methodology, a case study analysing the ZigBee RF4CE pairing protocol is presented. The case study shows the ease at which attacks can be integrated and how the methodology addresses the state space explosion problem. The impact of two attacks on the ZigBee protocol are analysed, showing several scenarios which lead to a mismatch in state at the ZigBee devices.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Coloured Petri Nets in Penetration Testing

Network penetration testing is a well-known approach used for security testing. Penetrating testing can be a laborious task which relies much on human knowledge and expertise, with various techniques employed, and an extensive amount of tools used in the process. A methodical approach to penetration testing is therefore recommended. The flaw hypothesis methodology, used in this thesis, represen...

متن کامل

Security Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets

Wireless communication demands for specialized protocols secure against attacks on the radio path while fitting the limited calculation and memory capabilities of mobile terminals. To ensure accessibility of mobile services beyond a user’s home network, signing on a foreign network should be possible. The latter must be able to authenticate a user without learning any secret registration data. ...

متن کامل

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design/CPN

In this paper, we present a technique to model and analyse cryptographic protocols using coloured Petri nets. A model of the protocol is constructed in a top-down manner: first the protocol is modeled without an intruder, then a generic intruder model is added. The technique is illustrated on the TMN protocol, with several mechanisms introduced to reduce the size of the occurrence graph. A smal...

متن کامل

Application of CPN Tools for Simulation and Analysis of Bandwidth Allocation

We consider the problem of bandwidth allocation in a substrate network as an optimization problem for the aggregate utility of multiple applications with diverse requirements and describe a simulation scheme for dynamically adaptive bandwidth allocation protocols. The proposed simulation model based on Coloured Petri Nets (CPN) is realized using CPN Tools. Keywords—Bandwidth Allocation Problem,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCP

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014