Mobile and Wireless Networks Security 2008
DOI: 10.1142/9789812833266_0004
|View full text |Cite
|
Sign up to set email alerts
|

An Industrial and Academic Joint Experiment on Automated Verification of a Security Protocol

Abstract: This paper relates the collaboration between industrial and academic teams for the design and the verification of a security protocol. The protocol is about trust establishment in large communities of devices where infrastructure components are not always reachable. The collaboration covers the writing of formal specifications up to their verification, using both manual and automated verification methods embedded in the AVISPA [1] and SPAN [7] tools. At each stage, the use of the visualization and protocol ani… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…The attack visualization as given in Fig. 12 is done by using SPAN, i.e., a Security Protocol ANimator for AVISPA, which is developed and demonstrated by a group of researchers and practitioners [46], [47]. The aim of this simulation is to investigate the security of our BPT scheme against replay attack and man-in-the-middle (MITM) attack.…”
Section: Simulation Results Using Avispamentioning
confidence: 99%
“…The attack visualization as given in Fig. 12 is done by using SPAN, i.e., a Security Protocol ANimator for AVISPA, which is developed and demonstrated by a group of researchers and practitioners [46], [47]. The aim of this simulation is to investigate the security of our BPT scheme against replay attack and man-in-the-middle (MITM) attack.…”
Section: Simulation Results Using Avispamentioning
confidence: 99%
“…We have not included the session key in shared secrets as it is not transferred in the protocol. We have used the SPAN + AVISPA virtual machine and SPAN graphical tool [31] to parse our specification and the OFMC backend to verify our protocol. The result in figure 5 indicates that our protocol is safe.…”
Section: Hlpslmentioning
confidence: 99%
“…These back-ends are used to identify flaws in protocols. SPAN [37,38] is a security protocol animator for AVISPA which is designed to help protocol developers in writing HLPSL specifications. A HLPSL specification is composed of three parts, namely a list of definitions of roles, a list of declarations of goals, and the read call of the main role.…”
Section: Formal Verification and Validation Of Framework Using Avispamentioning
confidence: 99%