Bioinspired Security Analysis of Wireless Protocols

被引:0
|
作者
Marinella Petrocchi
Angelo Spognardi
Paolo Santi
机构
[1] CNR Istitute of Informatics and Telematics,DTU Compute
[2] Technical University of Denmark,undefined
[3] MIT-Fraunhofer Ambient Mobility,undefined
来源
Mobile Networks and Applications | 2016年 / 21卷
关键词
Fraglets; Secure RFID protocols; Maude;
D O I
暂无
中图分类号
学科分类号
摘要
Fraglets represent an execution model for communication protocols that resembles the chemical reactions in living organisms. The strong connection between their way of transforming and reacting and formal rewriting systems makes a fraglet program amenable to automatic verification. Grounded on past work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary trying to circumvent the intended steps. The results of our analysis confirm the effectiveness of the cryptofraglets framework for the model and analysis of security properties and eventually show its potential to identify and uncover protocol flaws.
引用
收藏
页码:139 / 148
页数:9
相关论文
共 50 条
  • [41] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [42] Towards a Quantitative Analysis of Security Protocols
    Adao, Pedro
    Mateus, Paulo
    Reis, Tiago
    Vigano, Luca
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 164 (03) : 3 - 25
  • [43] Theoretical Analysis of RFID Security Protocols
    Zavvari, A.
    Islam, M. T.
    Shakiba, M.
    Mandeep, S. J.
    2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 302 - 306
  • [44] Analysis of Security Protocols for Mobile Healthcare
    Wazid, Mohammad
    Zeadally, Sherali
    Das, Ashok Kumar
    Odelu, Vanga
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
  • [45] Analysis of Security Protocols for Mobile Healthcare
    Mohammad Wazid
    Sherali Zeadally
    Ashok Kumar Das
    Vanga Odelu
    Journal of Medical Systems, 2016, 40
  • [46] Verifying security protocols by knowledge analysis
    School of Systems Engineering, The University of Reading, Reading, United Kingdom
    不详
    不详
    Int. J. Secur. Netw., 2008, 3 (183-192): : 183 - 192
  • [47] Web security: Authentication protocols and their analysis
    Wu Wen
    Fumio Mizoguchi
    New Generation Computing, 2001, 19 : 283 - 299
  • [48] A method for symbolic analysis of security protocols
    Boreale, M
    Buscemi, MG
    THEORETICAL COMPUTER SCIENCE, 2005, 338 (1-3) : 393 - 425
  • [49] Analysis of security protocols as open systems
    Martinelli, F
    THEORETICAL COMPUTER SCIENCE, 2003, 290 (01) : 1057 - 1106
  • [50] A Hybrid Analysis for Security Protocols with State
    Ramsdell, John D.
    Dougherty, Daniel J.
    Guttman, Joshua D.
    Rowe, Paul D.
    INTEGRATED FORMAL METHODS, IFM 2014, 2014, 8739 : 272 - 287