Model of DoS Resistant Broadcast Authentication Protocol in Colored Petri Net Environment
نویسندگان
چکیده
This paper deals with simulation of the broadcast authentication protocols using Coloured Petri Nets (CPN). CPN is a special instance of an orientated graph which enables to describe data flows and information dependencies inside of modeled systems. Protocol DREAM was taken as an example of broadcast authenticating protocol to show how Colour Petri Nets can be used to create a fully functional model of the protocol. Broadcast authentication protocols can be used in many situations where exist only one transmitter and multiple recipients such as message exchange in sensor networks routing protocols, or the process of leader election in sensors networks. Keywordsauthentication, protocol, security, DoS, Coloured Petri Nets.
منابع مشابه
Analysis of Broadcast Authentication Mechanism in Selected Network Topologies
This paper deals with simulation of the broadcast authentication protocols using Colored Petri Nets and further optimizations in Matlab environment. Typical application of broadcast authentication protocols can be configurations where only one transmitter with multiple recipients exists (such as message exchange in sensor networks routing protocols, or the leader election process in sensors net...
متن کاملDeterministic Measurement of Reliability and Performance Using Explicit Colored Petri Net in Business Process Execution Language and Eflow
Today there are many techniques for web service compositions. Evaluation of quality parameters has great impact on evaluation of final product. BPEL is one of those techniques that several researches have been done on its evaluation. However, there are few researches on evaluation of QoS in eflow. This research tries to evaluate performance and reliability of eflow and BPEL through mapping them...
متن کاملAutomatic detection of DoS vulnerabilities of cryptographic protocols
In this article the subject of DoS vulnerabilities of cryptographic key establishment and authentication protocols is discussed. The system for computer-aided DoS protocol resistance analysis, which employs the Petri nets formalism and Spin model-checker, is presented.
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کامل