Petri net based models for specification and analysis of cryptographic protocols
Journal of Systems and Software
Modeling and verification of cryptographic protocols using coloured petri nets and design/CPN
Nordic Journal of Computing
Coloured Petri Nets and CPN Tools for modelling and validation of concurrent systems
International Journal on Software Tools for Technology Transfer (STTT)
On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures
International Journal of Wireless and Mobile Computing
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
International Journal of Wireless and Mobile Computing
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
PETRI NETS '08 Proceedings of the 29th international conference on Applications and Theory of Petri Nets
Fault Diagnosis in Discrete Event Systems Modeled by Partially Observed Petri Nets
Discrete Event Dynamic Systems
Security analysis of the secure authentication protocol by means of coloured petri nets
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
FMOODS'10/FORTE'10 Proceedings of the 12th IFIP WG 6.1 international conference and 30th IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems
On the security of public key protocols
IEEE Transactions on Information Theory
Hi-index | 0.00 |
In this paper, we propose a practical model checking methodology for the analysis of key exchange confidentiality property and authentication property of cryptographic protocols modelled by Coloured Petri Net CPN; and propose a new attack trace generation algorithm based on the Observed Coloured Petri Net OCPN, which is equipped with indicators that allow observation of the tokens in some of the places and/or observation of the firing of some of the transitions. Our methodology offers an efficient analysis of all attack traces for each found attack. In addition, we apply our method to TMN authenticated key exchanged protocol of mobile communication systems, and verified the effectiveness of our methodology.