Modeling efficient multi-chained stream signature protocol using communicating sequential processeses

Loading...
Publication Logo

Date

2010

Authors

Ahmet Hasan Koltuksuz
Murat Ozkan
Burcu Külahçioǧlu

Journal Title

Journal ISSN

Volume Title

Publisher

Open Access Color

Green Open Access

Yes

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Average
Influence
Average
Popularity
Average

Research Projects

Journal Issue

Abstract

Communicating Sequential Processes (CSP) is a process algebra designed for modeling and analyzing the behavior of concurrent systems. Several security protocols are modeled with CSP and verified using model-checking or theorem proving techniques successfully. Unlike other authentication protocols modeled using CSP each of the Efficient Multi-chained Stream Signature (EMSS) protocol messages are linked to the previous messages forming hash chains which introduces difficulties for modeling and verification. In this paper, we model the EMSS stream authentication protocol using CSP and verify its authentication properties with model checking by building an infinite state model of the protocol which is reduced into a finite state model. © 2010 IEEE. © 2010 Elsevier B.V. All rights reserved.

Description

Keywords

Communicating Sequential Processeses, Model Checking, Security Protocol Verification, Authentication Protocols, Communicating Sequential Process, Communicating Sequential Processeses, Concurrent Systems, Finite-state Models, Hash Chains, Infinite State, Process Algebras, Protocol Message, Security Protocol Verification, Security Protocols, Stream Authentication, Authentication, Computer Operating Procedures, Hydraulics, Mathematical Models, Model Checking, Network Protocols, Software Reliability, Theorem Proving, Network Security, Authentication protocols, Communicating sequential process, Communicating Sequential Processeses, Concurrent systems, Finite-state models, Hash chains, Infinite state, Process algebras, Protocol message, Security protocol verification, Security protocols, Stream authentication, Authentication, Computer operating procedures, Hydraulics, Mathematical models, Model checking, Network protocols, Software reliability, Theorem proving, Network security, Security Protocol Verification, Model Checking, Communicating Sequential Processeses, Security protocol verification, Communicating Sequential Processeses, Network security, Processeses

Fields of Science

0211 other engineering and technologies, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences

Citation

WoS Q

Scopus Q

OpenCitations Logo
OpenCitations Citation Count
N/A

Source

4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion SSIRI-C 2010

Volume

Issue

Start Page

54

End Page

61
PlumX Metrics
Citations

Scopus : 0

Captures

Mendeley Readers : 8

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
0.0

Sustainable Development Goals

SDG data is not available