Application of colored petri nets in security protocol analysis

被引:1
作者
Zhang, Jialin [1 ]
Miao, Xianghua [1 ]
机构
[1] Kunming Univ Sci & Technol, Sch Informat Engn & Automat, Kunming 650031, Yunnan, Peoples R China
来源
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ALGORITHMS, SOFTWARE ENGINEERING, AND NETWORK SECURITY, ASENS 2024 | 2024年
关键词
security protocol; formal analysis; model checking; Colored Petri Nets; automated modeling; CPN Tools; FORMAL ANALYSIS; AUTHENTICATION;
D O I
10.1145/3677182.3677304
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Colored Petri Nets (CPN) used in this paper is an automatic modeling tool based on model detection, which introduces the concept of "color set" and expands the expression capability of Petri nets. In addition, CPN Tools, a mature CPN modeling tool, is different from the commonly used method of establishing reverse state analysis equation before, which makes the model establishment graphical and hierarchical, and its own state space analysis tool and CPN ML language can efficiently help analysts get the desired data. In this paper, the principle and advantages of formal analysis of security protocols using CPN are introduced in detail. Dolev-Yao attacker model and CPN Tools are used to demonstrate the effectiveness and intuitiveness of modeling analysis using CPN by taking TMN as an example. Finally, this method is compared with mainstream formal analysis tools. The characteristics and limitations of each tool are discussed.
引用
收藏
页码:676 / 682
页数:7
相关论文
共 24 条
[1]   Formal modelling and analysis of DNP3 secure authentication [J].
Amoah, Raphael ;
Camtepe, Seyit ;
Foo, Ernest .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 :345-360
[2]  
Basin D.A., 2018, Handbook of Model Checking, P727, DOI DOI 10.1007/978-3-319-10575-8
[3]   On Formal Modeling and Validation of Wireless Sensor Network Protocols [J].
Bechar, Rachid ;
Tahar Abbes, Mounir ;
Mezoudj, Fareha ;
Bellatreche, Ladjel .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) :2855-2888
[4]   On the Price of Concurrency in Group Ratcheting Protocols [J].
Bienstock, Alexander ;
Dodis, Yevgeniy ;
Roesler, Paul .
THEORY OF CRYPTOGRAPHY, TCC 2020, PT II, 2020, 12551 :198-228
[5]   A Formal Security Analysis of the Signal Messaging Protocol [J].
Cohn-Gordon, Katriel ;
Cremers, Cas ;
Dowling, Benjamin ;
Garratt, Luke ;
Stebila, Douglas .
JOURNAL OF CRYPTOLOGY, 2020, 33 (04) :1914-1983
[6]   Taxonomy and analysis of security protocols for Internet of Things [J].
Das, Ashok Kumar ;
Zeadally, Sherali ;
He, Debiao .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 :110-125
[7]  
Deshmukh S, 2017, 2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), P71, DOI 10.1109/ICNETS2.2017.8067900
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]   Formal Analysis of Smart Contract Based on Colored Petri Nets [J].
Duo, Wang ;
Xin, Huang ;
Xiaofeng, Ma .
IEEE INTELLIGENT SYSTEMS, 2020, 35 (03) :19-29
[10]  
[冯涛 Feng Tao], 2020, [计算机研究与发展, Journal of Computer Research and Development], V57, P2312