By Topic

Analyzing and verifying Petri net model of security protocol based on Maria

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Yan Wang ; Coll. of Comput. Sci., Inner Mongolia Univ., Huhhot, China ; Jiantao Zhou ; Hua Li ; Ying Hao

Formal specification and analysis of security protocol is a research hotspot in network security at present. This paper models authentication service exchange of Public-Key Kerberos Protocol and an attack against this protocol with Petri nets. The Maria Tool automates analysis and verification of the model and finds that PKINIT-26 protocol has a security flaw. So we improve the model according to PKINIT-27 specification and verify authenticity of the improved model. It argues that Maria has the ability to analyze and verify sophisticated security protocols. Furthermore, it can be widely applied for automated analysis and verification of security protocol.

Published in:

Computer Application and System Modeling (ICCASM), 2010 International Conference on  (Volume:2 )

Date of Conference:

22-24 Oct. 2010