Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets

  • Authors:
  • Roland Bouroulet;Raymond Devillers;Hanna Klaudel;Elisabeth Pelz;Franck Pommereau

  • Affiliations:
  • LACL, Université Paris Est, Créteil F-94010;Département d'Informatique, CP212, Université Libre de Bruxelles,;IBISC, Université d'Evry, bd François Mitterrand, Evry F-91025;LACL, Université Paris Est, Créteil F-94010;LACL, Université Paris Est, Créteil F-94010

  • Venue:
  • PETRI NETS '08 Proceedings of the 29th international conference on Applications and Theory of Petri Nets
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authentication) of security protocols. The protocol agents (e.g., an initiator, a responder, a server, a trusted third party, ...) are formalized as roles, each of them having a predefined behavior depending on their global and also local knowledge (including for instance public, private and shared keys), and may interact in a potentially hostile environment.The main characteristics of our framework, is that it makes explicit, structured and formal, the usually implicit information necessary to analyse the protocol, for instance the public and private contextof execution. The roles and the environment are expressed using SPL processes and compositionally translated into high-level Petri nets, while the context specifying the global and local knowledge of the participants in the protocol is used to generate the corresponding initial marking (with respect to the studied property). Finally, this representation is used to analyse the protocol properties, applying techniques of simulation and model-checking on Petri nets. The complete approach is illustrated on the case study of the Kao-Chow authentication protocol.