Modeling efficient multi-chained stream signature protocol using communicating sequential processeses
Loading...

Date
2010
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Open Access Color
Green Open Access
Yes
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
Communicating Sequential Processes (CSP) is a process algebra designed for modeling and analyzing the behavior of concurrent systems. Several security protocols are modeled with CSP and verified using model-checking or theorem proving techniques successfully. Unlike other authentication protocols modeled using CSP each of the Efficient Multi-chained Stream Signature (EMSS) protocol messages are linked to the previous messages forming hash chains which introduces difficulties for modeling and verification. In this paper, we model the EMSS stream authentication protocol using CSP and verify its authentication properties with model checking by building an infinite state model of the protocol which is reduced into a finite state model. © 2010 IEEE. © 2010 Elsevier B.V. All rights reserved.
Description
Keywords
Communicating Sequential Processeses, Model Checking, Security Protocol Verification, Authentication Protocols, Communicating Sequential Process, Communicating Sequential Processeses, Concurrent Systems, Finite-state Models, Hash Chains, Infinite State, Process Algebras, Protocol Message, Security Protocol Verification, Security Protocols, Stream Authentication, Authentication, Computer Operating Procedures, Hydraulics, Mathematical Models, Model Checking, Network Protocols, Software Reliability, Theorem Proving, Network Security, Authentication protocols, Communicating sequential process, Communicating Sequential Processeses, Concurrent systems, Finite-state models, Hash chains, Infinite state, Process algebras, Protocol message, Security protocol verification, Security protocols, Stream authentication, Authentication, Computer operating procedures, Hydraulics, Mathematical models, Model checking, Network protocols, Software reliability, Theorem proving, Network security, Security Protocol Verification, Model Checking, Communicating Sequential Processeses, Security protocol verification, Communicating Sequential Processeses, Network security, Processeses
Fields of Science
0211 other engineering and technologies, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences
Citation
WoS Q
Scopus Q

OpenCitations Citation Count
N/A
Source
4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion SSIRI-C 2010
Volume
Issue
Start Page
54
End Page
61
Collections
PlumX Metrics
Citations
Scopus : 0
Captures
Mendeley Readers : 8
Google Scholar™


