Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Murphi Verification System
CAV '96 Proceedings of the 8th International Conference on Computer Aided Verification
Hi-index | 0.00 |
We present a unilateral authentication protocol for protecting IPv6 networks against abuse of mobile IPv6 primitives. The proposed protocol imposes minimal computational requirements on mobile nodes, uses as few messages as possible. It is also easy to implement, economic to deploy and lightweight in use. We formally verifies the correctness of the protocol using the finite-state analysis tool mur φ, which has been used previously to analyze hardware designs and security properties of several protocols.