Modeling and analysis of authentication protocols using colored Petri nets

  • Authors:
  • Yang Xu;Xiaoyao Xie

  • Affiliations:
  • Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal University, Guiyang, China and School of Computer Science and Technology, Guizhou University, Guiyang, China;Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal University, Guiyang, China and School of Computer Science and Technology, Guizhou University, Guiyang, China

  • Venue:
  • ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Authentication protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols correctly. However, it is difficult to design authentication protocols that are immune to malicious attack, since good analysis techniques are lacking. In this paper, combining some analysis methods currently for analysis of security protocols based on Petri Nets methods together, a Colored Petri Net for the Andrew secure RPC protocol fixed in [10] has been presented. And then an intruder model is developed and integrated into the protocol model. Model checking is performed in CPN Tools. In the model checking, two methods are used. After model checking and the state space analysis, an attack is found.