Analysing Security Protocols Using Refinement in iUML-B

被引:5
作者
Snook, Colin [1 ]
Hoang, Thai Son [1 ]
Butler, Michael [1 ]
机构
[1] Univ Southampton, ECS, Southampton, England
来源
NASA FORMAL METHODS (NFM 2017) | 2017年 / 10227卷
关键词
Virtual LAN; Security; Event-B; iUML-B;
D O I
10.1007/978-3-319-57288-8_6
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
We propose a general approach based on abstraction and refinement for constructing and analysing security protocols using formal specification and verification. We use class diagrams to specify conceptual system entities and their relationships. We use state-machines to model the protocol execution involving the entities' interactions. Features of our approach include specifying security principles as invariants of some abstract model of the overall system. The specification is then refined to introduce implementable mechanisms for the protocol. A gluing invariant specifies why the protocol achieves the security principle. Security breaches arise as violations of the gluing invariant. We make use of both theorem proving and model checking techniques to analyse our formal model, in particular, to explore the source and consequence of the security attack. To demonstrate the use of our approach we explore the mechanism of a security attack in a network protocol.
引用
收藏
页码:84 / 98
页数:15
相关论文
共 27 条
  • [21] Performance and security analysis using B-128 modified blowfish algorithm
    Kumar, Sunil
    Kumar, Dilip
    Singh, Naini
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (17) : 26661 - 26678
  • [22] Proving the Effectiveness of Negotiation Protocols KQML in Multi-agent Systems Using Event-B
    Ali, Ammar Alhaj
    Jasek, Roman
    Krayem, Said
    Zacek, Petr
    CYBERNETICS AND MATHEMATICS APPLICATIONS IN INTELLIGENT SYSTEMS, CSOC2017, VOL 2, 2017, 574 : 397 - 406
  • [23] Specification and verification of multi-agent systems interaction protocols using a combination of AUML and Event B
    Ben Ayed, Leila Jemni
    Siala, Fatma
    INTERACTIVE SYSTEMS: DESIGN, SPECIFICATION, AND VERIFICATION, PROCEEDINGS, 2008, 5136 : 102 - 107
  • [24] ES3B: Enhanced Security System for Smart Building using IoT
    Dutta, Joy
    Wang, Yong
    Maitra, Tanmoy
    Islam, S. K. Hafizul
    Rawal, Bharat S.
    Giri, Debasis
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2018, : 158 - 165
  • [25] Refinement-based Specification and Analysis of Multi-core ARINC 653 Using Event-B
    Zhang, Feng
    Zhang, Leping
    Zhao, Yongwang
    Liu, Yang
    Sun, Jun
    FORMAL ASPECTS OF COMPUTING, 2023, 35 (04)
  • [26] Unified security architecture and protocols using third party identity in V2V and V2I networks
    Choi, Jaeduck
    Jung, Souhwan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2012, 12 (15) : 1326 - 1337
  • [27] Security-Reliability Trade-Off Analysis for Rateless Codes-Based Relaying Protocols Using NOMA, Cooperative Jamming and Partial Relay Selection
    Duy-Hung Ha
    Tran Trung Duy
    Pham Ngoc Son
    Thuong Le-Tien
    Voznak, Miroslav
    IEEE ACCESS, 2021, 9 : 131087 - 131108