2021
DOI: 10.3390/s21093055
|View full text |Cite
|
Sign up to set email alerts
|

SAT and SMT-Based Verification of Security Protocols Including Time Aspects

Abstract: For many years various types of devices equipped with sensors have guaranteed proper work in a huge amount of machines and systems. For the proper operation of sensors, devices, and complex systems, we need secure communication. Security protocols (SP) in this case, guarantee the achievement of security goals. However, the design of SP is not an easy process. Sometimes SP cannot realise their security goals because of errors in their constructions and need to be investigated and verified in the case of their c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 44 publications
0
3
0
Order By: Relevance
“…The BMC method restricts the parameters (e.g., number of cycles and number of concurrencies) associated with the state space explosion 31 . It encodes the system behavior and property constraints into a finite set of constraints and then uses the SMT solver 32 to automatically perform an exhaustive search for the existence of a counterexample path in the system state space.…”
Section: Bmc‐based Tstm Model Verification Methodsmentioning
confidence: 99%
“…The BMC method restricts the parameters (e.g., number of cycles and number of concurrencies) associated with the state space explosion 31 . It encodes the system behavior and property constraints into a finite set of constraints and then uses the SMT solver 32 to automatically perform an exhaustive search for the existence of a counterexample path in the system state space.…”
Section: Bmc‐based Tstm Model Verification Methodsmentioning
confidence: 99%
“…In [Szy+21], Szymoniak et al build on previous works [JP07; KP12b], and perform a formal modeling and timed analyses of the WooLamPi protocol and of the Sensor Network Encryption Protocol [Per+02]. Reachability using SMT is used to identify the time frames during which a man-in-the middle behavior (i. e., a passive interception of the data) is possible.…”
Section: Sat-and Smt-based Verificationmentioning
confidence: 99%
“…When a path vector message is received, each router must check the advertised path against its policy. If the message conforms to the routers policy, it is updated in both the routing table and the message itself before being sent to the next neighbor (Szymoniak, Siedlecka-Lamch, Zbrzezny, Zbrzezny, & Kurkowski, 2021). It makes the necessary changes to the routing table in order to maintain a track of the autonomous systems that are required to be traversed on the way to the target system.…”
Section: Introductionmentioning
confidence: 99%