Modeling and Verifying Time Sensitive Security Protocols with Constraints

  • Ti Zhou*
  • , Mengjun Li
  • , Zhoujun Li
  • , Huowang Chen
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

This paper researches the characteristic of time sensitive protocols and presents a method with simple operations to verify protocols with time stamps and avoid false attacks. Firstly, an extension of π calculus is given to model a time sensitive security protocol. And then, by appending linear arithmetic constraints to the Horn logic model, the extended Horn logic model of security protocols and the modified-version verification method with time constraints are represented. All operations and the strategy of verification are defined for our constraints system. Thirdly, a method is given to determine whether the constraints has a solution or not. Finally, as a result of an experiment, Denning-Sacco protocol with time stamps is verified. The experiment shows that our approach is an innovative and effective method on verifying time sensitive security protocols.

Original languageEnglish
Pages (from-to)103-118
Number of pages16
JournalElectronic Notes in Theoretical Computer Science
Volume212
Issue numberC
DOIs
StatePublished - 30 Apr 2008

Keywords

  • constraint
  • formal verification
  • security protocol
  • time sensitive

Fingerprint

Dive into the research topics of 'Modeling and Verifying Time Sensitive Security Protocols with Constraints'. Together they form a unique fingerprint.

Cite this