A Coloured Petri Net Methodology and Library for Security Analysis of Network Protocols
نویسندگان
چکیده
Formal methods are often used to prove properties of network protocols, including required security properties. However for a protocol modeller the techniques available for security analysis often require expert knowledge of the technique. Also the tight coupling of protocol model and security attacks limit re-use of models. With Coloured Petri nets as the selected formal method, this paper proposes a methodology to support a modeller in performing security analysis of a protocol. The methodology enhances the re-usability, extendability and readability of protocol and attack models, with the aim of simplifying the tasks of the modeller. Key to the methodology is the decoupling of the protocol and attack models by using the hierarchical structure of Coloured Petri nets. Also a library of attack modules is developed based on Dolev-Yao assumptions; the modules can be composed to create complex attacks and re-used across different protocols. To demonstrate the methodology, a case study analysing the ZigBee RF4CE pairing protocol is presented. The case study shows the ease at which attacks can be integrated and how the methodology addresses the state space explosion problem. The impact of two attacks on the ZigBee protocol are analysed, showing several scenarios which lead to a mismatch in state at the ZigBee devices.
منابع مشابه
Using Coloured Petri Nets in Penetration Testing
Network penetration testing is a well-known approach used for security testing. Penetrating testing can be a laborious task which relies much on human knowledge and expertise, with various techniques employed, and an extensive amount of tools used in the process. A methodical approach to penetration testing is therefore recommended. The flaw hypothesis methodology, used in this thesis, represen...
متن کاملSecurity Analysis of the Secure Authentication Protocol by Means of Coloured Petri Nets
Wireless communication demands for specialized protocols secure against attacks on the radio path while fitting the limited calculation and memory capabilities of mobile terminals. To ensure accessibility of mobile services beyond a user’s home network, signing on a foreign network should be possible. The latter must be able to authenticate a user without learning any secret registration data. ...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملModeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design/CPN
In this paper, we present a technique to model and analyse cryptographic protocols using coloured Petri nets. A model of the protocol is constructed in a top-down manner: first the protocol is modeled without an intruder, then a generic intruder model is added. The technique is illustrated on the TMN protocol, with several mechanisms introduced to reduce the size of the occurrence graph. A smal...
متن کاملApplication of CPN Tools for Simulation and Analysis of Bandwidth Allocation
We consider the problem of bandwidth allocation in a substrate network as an optimization problem for the aggregate utility of multiple applications with diverse requirements and describe a simulation scheme for dynamically adaptive bandwidth allocation protocols. The proposed simulation model based on Coloured Petri Nets (CPN) is realized using CPN Tools. Keywords—Bandwidth Allocation Problem,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCP
دوره 9 شماره
صفحات -
تاریخ انتشار 2014