Science Alert
Curve Top
Information Technology Journal
  Year: 2009 | Volume: 8 | Issue: 7 | Page No.: 1065-1070
DOI: 10.3923/itj.2009.1065.1070
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Applying SMV for Security Protocol Verification

Jia Mei, Huaikou Miao and Pan Liu

With the rapid development of the internet, a lot of attentions have been paid to the reliability of the security protocols. Model checking can be used to obtain the assurance that a protocol can not be threatened by an intruder. In this study, on the basis of former researches, an approach is presented for using efficient and complete formal verification tool SMV to model and verify security protocol. By this approach, we can construct related model easily and verifying the property automatically. We illustrate the approach by taking Otway-Rees protocol as an example and discover an attack upon the protocol. Finally, the protocol is adapted to satisfy the security properties.
PDF Fulltext XML References Citation Report Citation
  •    Specifications Mining Based on Adjusted Automata Learning Algorithm
  •    Automatic Verification of Security Properties of Remote Internet Voting Protocol in Symbolic Model
  •    Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus
  •    Refinement of Mechanized Proof of Security Properties of Remote Internet Voting Protocol in Applied PI Calculus with Proverif
How to cite this article:

Jia Mei, Huaikou Miao and Pan Liu, 2009. Applying SMV for Security Protocol Verification. Information Technology Journal, 8: 1065-1070.

DOI: 10.3923/itj.2009.1065.1070






Curve Bottom