A Search-Based Framework for Security Protocol Synthesis
نویسنده
چکیده
Security protocol verification has been the area where the bulk of the research in cryptographic protocols has taken place and a number of successful supporting tools have been developed. However, not much research has been done in the area of applying formal methods to the design of cryptographic protocols in the first place, despite wide recognition that the design of cryptographic protocols is very difficult. Most existing protocols have been designed using informal methods and heavily rely on the verification process to pick up vulnerabilities. The research reported in this thesis shows how to automatically synthesise abstract protocols using heuristic search, explains how to add high-level efficiency concerns to the synthesis, and demonstrates how to refine the abstract protocols to executable Java Code.
منابع مشابه
RSPAE: RFID Search Protocol based on Authenticated Encryption
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
متن کاملA New Framework for Secure Routing in VANET
Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...
متن کاملEthical Patient Prioritization in Disaster Triage: A Protocol for a Systematic Review
Background: Disasters are medically defined as events in which the demands for patients’ care far exceed the available resources. In such situations, triage and rationing of limited resources are inevitable. A decision regarding triage needs not only scientific guidelines but also an ethical framework and supporting policies. This study aims to provide a comprehensive review of the criteria for...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملTOWARD A DEFINITION COMPETENCY FRAMEWORK FOR COMPETENCY-BASED EDUCATION IN NURSING: CRITICAL REVIEW OF EVIDENCE
Background & Aims: In recent years the issues surrounding competency-based education (CBE) increased attention and debate among health professionals and the international conferences and pilot projects proposed by a growing number of many of the issues of education magazines Medical critically examined. Because it had not been provided in nursing competency-based framework, providing a comprehe...
متن کامل