Analysis of Security Protocol Based on Petri Nets
Petri Nets (PNs) have shown to be a formal method to design and model the security protocol. We first apply PNs to model the security protocol. To analyze the security protocol conveniently and efficiently, we present a method to translate PNs into Promela code and discuss in detail the transform rule. We use the LTL to formalize the correct properties of the protocol, and whole PNs of the security protocol is checked by SPIN. Additionally, we employ the Woo-Lam protocol to illustrate the feasibility of our method.
Security protocol PNs LTL Promela/SPIN Model checking
Fengli Liu Wei Han Mingyue Jiang
Center of Math Computing and Software Engineering, Zhejiang Sci-Tech University, Hangzhou, Zhejiang, P. R. China
国际会议
2010 International Conference on Circuit and Signal Processing(2010年电路与信号处理国际会议 ICCSP 2010)
上海
英文
451-454
2010-12-25(万方平台首次上网日期,不代表论文的发表时间)