Utilization of timed automata as a verification tool for security protocols

Loading...
Publication Logo

Date

2010

Authors

Ahmet Hasan Koltuksuz
Burcu Külahçioǧlu
Murat Ozkan

Journal Title

Journal ISSN

Volume Title

Publisher

Open Access Color

Green Open Access

Yes

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Average
Influence
Average
Popularity
Average

Research Projects

Journal Issue

Abstract

Timed Automata is an extension to the automata-theoretic approach for the modeling of real time systems that introduces time into the classical automata. It has become an important research area in both the context of formal languages and modeling and verification of real time systems since it was proposed by Alur and Dill in the early nineties. Timed automata proposes an efficient model checking method for verification real time systems having mature and efficient automatic verification tools. One of the application areas of timed automata is the verification of security protocols which are known to be time sensitive. This study aims to make use of timed automata as a verification tool for security protocols and gives a case study on the initial part of the Neuman- Stubblebine Repeated Authentication Protocol. © 2010 IEEE. © 2010 Elsevier B.V. All rights reserved.

Description

Keywords

Model Checking, Security Protocol Verification, Timed Automata, Application Area, Authentication Protocols, Automata-theoretic Approach, Automatic Verification Tools, Research Areas, Security Protocol Verification, Security Protocols, Timed Automata, Verification Tools, Automata Theory, Formal Languages, Interactive Computer Systems, Model Checking, Network Protocols, Real Time Systems, Software Reliability, Network Security, Application area, Authentication protocols, Automata-theoretic approach, Automatic verification tools, Research areas, Security protocol verification, Security protocols, Timed Automata, Verification tools, Automata theory, Formal languages, Interactive computer systems, Model checking, Network protocols, Real time systems, Software reliability, Network security, Security Protocol Verification, Timed Automata, Model Checking, Security protocol verification, Model checking, Network security, Timed automata

Fields of Science

0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences

Citation

WoS Q

Scopus Q

OpenCitations Logo
OpenCitations Citation Count
5

Source

4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion SSIRI-C 2010

Volume

Issue

Start Page

86

End Page

93
PlumX Metrics
Citations

CrossRef : 3

Scopus : 7

Captures

Mendeley Readers : 11

SCOPUS™ Citations

7

checked on Apr 08, 2026

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
0.0

Sustainable Development Goals

SDG data is not available