×

Modeling and analysis of security protocols using role based specifications and Petri nets. (English) Zbl 1143.68476

van Hee, Kees M. (ed.) et al., Applications and theory of Petri nets. 29th international conference, PETRI NETS 2008, Xi’an, China, June 23–27, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68745-0/pbk). Lecture Notes in Computer Science 5062, 72-91 (2008).
Summary: In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authentication) of security protocols. The protocol agents (e.g., an initiator, a responder, a server, a trusted third party, \(\dots\)) are formalized as roles, each of them having a predefined behavior depending on their global and also local knowledge (including for instance public, private and shared keys), and may interact in a potentially hostile environment.
The main characteristics of our framework, is that it makes explicit, structured and formal, the usually implicit information necessary to analyse the protocol, for instance the public and private context of execution. The roles and the environment are expressed using SPL processes and compositionally translated into high-level Petri nets, while the context specifying the global and local knowledge of the participants in the protocol is used to generate the corresponding initial marking (with respect to the studied property). Finally, this representation is used to analyse the protocol properties, applying techniques of simulation and model-checking on Petri nets. The complete approach is illustrated on the case study of the Kao-Chow authentication protocol.
For the entire collection see [Zbl 1138.68009].

MSC:

68Q85 Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.)
68Q60 Specification and verification (program logics, model checking, etc.)
94A62 Authentication, digital signatures and secret sharing

Software:

AVISPA; Casper; Helena