Formal methods are a popular means to specify and verify security properties of avariety of communication protocols. In this article we take a step towards the use ofteam automata for the analysis of security aspects in such protocols. To this aim, wedefine an insecure communication scenario for team automata that is general enoughto encompass various communication protocols. We then reformulate the GeneralizedNon-Deducibility on Compositions schema--originally introduced in the contextof process algebrae--in terms of team automata. Based on the resulting team automataframework, we subsequently develop two analysis strategies that can be used to verifysecurity properties of communication protocols. Indeed, the paper concludes with twocase studies in which we show how our framework can be used to prove integrity andsecrecy in two different settings: We show how integrity is guaranteed in a team automatonmodel of a particular instance of the Efficient Multi-chained Stream Signatureprotocol, a communication protocol for signing digital streams that provides some robustnessagainst packet loss, and we show how secrecy is preserved when a member ofa multicast group leaves the group in a particular run of the complementary variableapproach to the N-Root/Leaf pairwise keys protocol.

A team automaton scenario for the analysis of security properties of communication protocols

ter Beek M. H.;Petrocchi M.
2006

Abstract

Formal methods are a popular means to specify and verify security properties of avariety of communication protocols. In this article we take a step towards the use ofteam automata for the analysis of security aspects in such protocols. To this aim, wedefine an insecure communication scenario for team automata that is general enoughto encompass various communication protocols. We then reformulate the GeneralizedNon-Deducibility on Compositions schema--originally introduced in the contextof process algebrae--in terms of team automata. Based on the resulting team automataframework, we subsequently develop two analysis strategies that can be used to verifysecurity properties of communication protocols. Indeed, the paper concludes with twocase studies in which we show how our framework can be used to prove integrity andsecrecy in two different settings: We show how integrity is guaranteed in a team automatonmodel of a particular instance of the Efficient Multi-chained Stream Signatureprotocol, a communication protocol for signing digital streams that provides some robustnessagainst packet loss, and we show how secrecy is preserved when a member ofa multicast group leaves the group in a particular run of the complementary variableapproach to the N-Root/Leaf pairwise keys protocol.
2006
Istituto di Scienza e Tecnologie dell'Informazione "Alessandro Faedo" - ISTI
Team automata
Security analysis
Security properties
Communication protocols
File in questo prodotto:
File Dimensione Formato  
prod_178148-doc_11623.pdf

solo utenti autorizzati

Descrizione: A team automaton scenario for the analysis of security properties of communication protocols
Tipologia: Versione Editoriale (PDF)
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 347.16 kB
Formato Adobe PDF
347.16 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/167882
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact