Attack trace generation of cryptographic protocols based on coloured Petri nets model

  • Authors:
  • Yunli Bai;Xinming Ye

  • Affiliations:
  • College of Computer Science, Inner Mongolia University, Hohhot, China/ College of Computer and Information Engineering, Inner Mongolia Agricultural University, Hohhot, China;College of Computer Science, Inner Mongolia University, Hohhot, China

  • Venue:
  • International Journal of Wireless and Mobile Computing
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we propose a practical model checking methodology for the analysis of key exchange confidentiality property and authentication property of cryptographic protocols modelled by Coloured Petri Net CPN; and propose a new attack trace generation algorithm based on the Observed Coloured Petri Net OCPN, which is equipped with indicators that allow observation of the tokens in some of the places and/or observation of the firing of some of the transitions. Our methodology offers an efficient analysis of all attack traces for each found attack. In addition, we apply our method to TMN authenticated key exchanged protocol of mobile communication systems, and verified the effectiveness of our methodology.