By Topic

Modeling and analysis of authentication protocols using Colored Petri Nets

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yang Xu ; Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal University, Guiyang, China ; Xiaoyao Xie

Authentication protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols correctly. However, it is difficult to design authentication protocols that are immune to malicious attack, since good analysis techniques are lacking. In this paper, combining some analysis methods currently for analysis of security protocols based on Petri Nets methods together, a colored Petri Net for the Andrew secure RPC protocol fixed in M. Burrows, M. Abadi, and R. Needham has been presented. And then an intruder model is developed and integrated into the protocol model. Model checking is performed in CPN Tools. In the model checking, two methods are used. After model checking and the state space analysis, an attack is found.

Published in:

2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication

Date of Conference:

20-22 Aug. 2009