Modeling and Analyzing Timed Security Protocols Using Extended Timed CSP
MetadataShow full item record
Security protocols are hard to design, even under the assumption of perfect cryptography. This is especially true when a protocol involves different timing aspects such as timestamps, timeout, delays and a set of timing constraints. In this paper, we propose a methodology for modeling and analyzing security protocols that are aware of timing aspects. We develop a formalism for modeling security protocols by extending Timed CSP with the capability of stating complicated timing behaviors for processes and events. A reasoning mechanism for the proposed formalism is developed based on Constraint Logic Programming (CLP). Using the reasoning engine built in CLP, the authentication properties of timed security protocols are able to be verified and attacks can be discovered. We demonstrate the capability of our method by modeling and verifying real-world security protocols. New approaches of using timing information to unfold and prevent potential attacks are also presented.
The article of record as published may be found at http://dx.doi.org/10.1109/SSIRI.2010.29
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2006);October 2006. Welcome to Volume 2, Issue Three of Homeland Security Affairs. This issue is dedicated to the memory of Lacy Suiter. I believe Lacy would be embarrassed by the idea of dedicating an issue of anything to him. ...
Shearer, Charles Dylan (Monterey, California. Naval Postgraduate School, 2011);A major goal of using any security protocol is to create certain beliefs in the participants. A security protocol will use techniques like cryptography to guarantee some things, but it will still require a participant to ...
Troncoso, Michael E. (Monterey, CA; Naval Postgraduate School, 2020-09);As Bluetooth is firmly ensconced as one of the leading standardizations for wireless communication, it becomes imperative to rigorously quantify its security. To forward this quantification, we conduct a comprehensive ...