Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Information Technology Journal
  Year: 2009 | Volume: 8 | Issue: 7 | Page No.: 1065-1070
DOI: 10.3923/itj.2009.1065.1070
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Applying SMV for Security Protocol Verification

Jia Mei, Huaikou Miao and Pan Liu

Abstract:
With the rapid development of the internet, a lot of attentions have been paid to the reliability of the security protocols. Model checking can be used to obtain the assurance that a protocol can not be threatened by an intruder. In this study, on the basis of former researches, an approach is presented for using efficient and complete formal verification tool SMV to model and verify security protocol. By this approach, we can construct related model easily and verifying the property automatically. We illustrate the approach by taking Otway-Rees protocol as an example and discover an attack upon the protocol. Finally, the protocol is adapted to satisfy the security properties.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Specifications Mining Based on Adjusted Automata Learning Algorithm
  •    Automatic Verification of Security Properties of Remote Internet Voting Protocol in Symbolic Model
  •    Automated Proof of Resistance of Denial of Service Attacks in Remote Internet Voting Protocol with Extended Applied Pi Calculus
  •    Refinement of Mechanized Proof of Security Properties of Remote Internet Voting Protocol in Applied PI Calculus with Proverif
How to cite this article:

Jia Mei, Huaikou Miao and Pan Liu, 2009. Applying SMV for Security Protocol Verification. Information Technology Journal, 8: 1065-1070.

DOI: 10.3923/itj.2009.1065.1070

URL: https://scialert.net/abstract/?doi=itj.2009.1065.1070

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom