Modeling and Analysis of Agent-Based Specifications of Security Protocols Using CSANs and PDETool

被引:0
|
作者
Akbarzadeh, Mojtaba [1 ]
Azgomi, Mohammad Abdollahi [1 ]
机构
[1] Iran Univ Sci & Technol, Sch Comp Engn, Tehran, Iran
来源
2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY | 2009年
关键词
FRAMEWORK;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Coloured stochastic activity networks (CSANs) are a useful formalism for modeling and analysis of computer systems and networks. PDETool is a new powerful modeling tool that supports CSANs. This paper is an attempt to propose a new approach for modeling and automatic verification of security protocols using CSANs and PDETool. In the proposed approach, the existing agents in the protocol are expressed formally as roles using the security protocols language (SPL) and then are modeled by CSANs. The approach has three steps. Firstly, the security protocol will be modeled regardless of the existence of any intruder. Secondly, different potential intruders will be modeled. Finally, by state space analysis of the model, the possibility of any security flaw in the protocol will be checked. As a case study, the Needham-Schroder and TMN protocols have been modeled and verified.
引用
收藏
页码:151 / 155
页数:5
相关论文
共 50 条
  • [21] Putting the agent in agent-based modeling
    Wellman, Michael P.
    AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2016, 30 (06) : 1175 - 1189
  • [22] Putting the agent in agent-based modeling
    Michael P. Wellman
    Autonomous Agents and Multi-Agent Systems, 2016, 30 : 1175 - 1189
  • [23] Using Machine Learning for Agent Specifications in Agent-Based Models and Simulations: A Critical Review and Guidelines
    Dehkordi, Molood Ale Ebrahim
    Lechner, Jonas
    Ghorbani, Amineh
    Nikolic, Igor
    Chappin, Emile
    Herder, Paulien
    JASSS-THE JOURNAL OF ARTIFICIAL SOCIETIES AND SOCIAL SIMULATION, 2023, 26 (01):
  • [24] An agent-based model of anonymous communication protocols
    Kitazawa, S
    Soshi, M
    Miyaji, A
    PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 177 - 182
  • [25] Agent-Based Modeling of Traffic Systems Using Modelica
    Sanz, Victorino I.
    Urquia, Alfonso A.
    COMPUTING IN SCIENCE & ENGINEERING, 2022, 24 (06) : 38 - 43
  • [26] Protocols for Agent-based Autonomous Negotiations: A Review
    Adnan, Muhamad Hariz Muhamad
    Hassan, Mohd Fadzil
    Aziz, Izzatdin
    Paputungan, Irving V.
    2016 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2016, : 622 - 626
  • [27] Agent-based modelling and analysis of security and efficiency in airport terminals
    Janssen, Stef
    Sharpanskykh, Alexei
    Curran, Richard
    TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES, 2019, 100 : 142 - 160
  • [28] Security considerations in agent-based systems
    Chess, DM
    FIRST ANNUAL CONFERENCE ON EMERGING TECHNOLOGIES AND APPLICATIONS IN COMMUNICATIONS, PROCEEDINGS, 1996, : 184 - 187
  • [29] An agent-based approach to security service
    Shakshuki, E
    Luo, ZH
    Gong, J
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2005, 28 (03) : 183 - 208
  • [30] Security in agent-based automation systems
    Khan, Basit A.
    Mad, Joergen
    Treytl, Albert
    ETFA 2007: 12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOLS 1-3, 2007, : 768 - 771