A team automaton scenario for the analysis of security properties of communication protocols

  • Authors:
  • Maurice H. Ter Beek;Gabriele Lenzini;Marinella Petrocchi

  • Affiliations:
  • ISTI-CNR, Pisa, Italy;Telematica Instituut, Enschede, The Netherlands;IIT-CNR, Pisa, Italy

  • Venue:
  • Journal of Automata, Languages and Combinatorics
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automata for the analysis of security aspects in such protocols. To this aim, we define an insecure communication scenario for team automata that is general enough to encompass various communication protocols. We then reformulate the Generalized Non-Deducibility on Compositions schema -originally introduced in the context of process algebrae -in terms of team automata. Based on the resulting team automata framework, we subsequently develop two analysis strategies that can be used to verify security properties of communication protocols. Indeed, the paper concludes with two case studies in which we show how our framework can be used to prove integrity and secrecy in two different settings: We show how integrity is guaranteed in a team automaton model of a particular instance of the Efficient Multi-chained Stream Signature protocol, a communication protocol for signing digital streams that provides some robustness against packet loss, and we show how secrecy is preserved when a member of a multicast group leaves the group in a particular run of the complementary variable approach to the N-Root/Leaf pairwise keys protocol.