Modelling and Verification of Extensible Authentication Protocol Using Spin Model Checker

نویسندگان

  • Manu S. Hegde
  • Sanjay Singh
چکیده

The Extensible Authentication Protocol (EAP) is a framework for transporting authentication credentials. EAP offers simpler interoperability and compatibility across authentication methods. EAP supports multiple authentication methods. In this paper, we have modelled the Extensible Authentication Protocol as a finite state machine. The various entities in our model are Authenticator, EAP Server, User and User Database. The messages exchanged between various entities are modelled as transitions. The model is represented in PROMELA. The model is checked for conformance with its specifications to detect possible flaws using SPIN model checker.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Environment for the Specification and Verification of Time-dependent Security Protocols

The use of formal methods in software engineering for the specification and the verification is suitable when developing complex systems. The distributed nature, the subtle time dependence and the strict requirements of time sensitive security protocols increase the inherent complexity of their validation. Using the TESLA authentication protocol as a case study, we shall discuss what are the fu...

متن کامل

The Initial Network Entry procedure in the Worldwide Interoperability for Microwave Access (WiMAX) network

The Initial Network Entry procedure is the first stage in establishing a connection in an IEEE 802.16 (WiMAX) network. The process involves the transmission of unencrypted management messages, which constitutes a major security flaw that is exploited by the Man-in-the-Middle (MITM) attack. This security defect necessitates the implementation of appropriate security protocols. Research has shown...

متن کامل

Automatic detection of DoS vulnerabilities of cryptographic protocols

In this article the subject of DoS vulnerabilities of cryptographic key establishment and authentication protocols is discussed. The system for computer-aided DoS protocol resistance analysis, which employs the Petri nets formalism and Spin model-checker, is presented.

متن کامل

Model-Checking the Linux Virtual File System

This paper presents a case study in modelling and verifying the Linux Virtual File System (VFS). Our work is set in the context of Hoare’s verification grand challenge and, in particular, Joshi and Holzmann’s mini-challenge to build a verifiable file system. The aim of the study is to assess the viability of retrospective verification of a VFS implementation using model-checking technology. We ...

متن کامل

Formal Modeling and Verification of Trusted OLSR Protocol Using I-SPIN Model Checker

An ad hoc network is a momentary network set up by the self-managed nodes that operate and communicate randomly with or without a little support of a network infrastructure. Due to security vulnerabilities ad hoc networks are defenseless against attacks of malicious nodes as the nodes in these networks are not secured by firewalls. In order to enhance the security of conventional OLSR Protocol ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012