129,374 Hits in 3.6 sec

Using a Formal Description Technique to Model Aspects of a Global Air Traffic Telecommunications Network [chapter]

J. H. Andrews, N. A. Day, J. J. Joyce
1997 Formal Description Techniques and Protocol Specification, Testing and Verification  
Aspects of a draft version of the Aeronautical Telecommunications Network (ATN) Standards and Recommended Practices (SARPs) under development by !  ...  The A TN SARPs are a specification for a global telecommunications network for air traffic control systems.  ...  Michael Donat provided helpful comments and corrections on earlier versions of this paper.  ... 
doi:10.1007/978-0-387-35271-8_26 fatcat:ycyckzfpoff47he6ousgrkytwm

Formal Verification of Authenticated AODV Protocol using AVISPA

Kinchit Vishesh, Amandeep Verma
2012 International Journal of Computer Applications  
These networks require secure routing protocols; as such networks are vulnerable to various attacks, because of their open and dynamic infrastructure.  ...  In this paper we analyze ad hoc on-demand distance vector routing protocol (AODV) using formal verification technique.  ...  of network protocols in [1] , to model check the AODV that is a widely used and fairly complex network protocol.  ... 
doi:10.5120/7914-1179 fatcat:f2yzvj2uofctpd3wjfrcaiqn3e

A Formal Model for Verification of ZigBee Protocol for Secure Network Authentication

Rana Muhammad Nadeem, Abdul Aziz Gill
2017 Indian Journal of Science and Technology  
Background/Objectives: In the modern age, there is a need of wireless network protocols verification using suitable techniques and tools to meet the security challenges in Wireless Ad-Hoc sensor networks  ...  In this paper we developed a model/ framework in Event-B for the formal verification of ZigBee protocol and simulate it using RODIN tool.  ...  The RODIN tools have been used for specifications, analysis and verification of formal models. Our model for verification of ZigBee is verified through Event-B using RODIN tool.  ... 
doi:10.17485/ijst/2017/v10i19/113927 fatcat:6jndetpdjneaxjnf25ioejahoq

Slede: Framework for automatic verification of sensor network security protocol implementations

Youssef Hanna, Hridesh Rajan
2009 2009 31st International Conference on Software Engineering - Companion Volume  
Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone.  ...  Key features include automation of: extraction of models, generation and composition of intrusion models, and verification of security properties.  ...  Evaluation We verified two sensor network security protocol implementations using Slede [6] . Slede was able to generate protocol specific intruder models of these protocol implementations.  ... 
doi:10.1109/icse-companion.2009.5071045 dblp:conf/icse/HannaR09 fatcat:jawejil4fne6zebinaz6y36uee

Embedding and Verification of ZigBee Protocol Stack in Event-B

Amjad Gawanmeh
2011 Procedia Computer Science  
In this paper we use Event-B formal verification method to model and verify ZigBee protocol stack by providing embedding of the protocol primitives in Event-B.  ...  Formal methods can be used efficiently to verify a wide range of systems, including ZigBee protocol stack specification.  ...  Formal verification [8] uses mathematical reasoning to verify that a design specification comprehends certain design requirements, and it has been used for the analysis, modeling and verification of  ... 
doi:10.1016/j.procs.2011.07.097 fatcat:pfsjvtej25cgvl6cl7jg6ccm7m

Exploring the Design Space for Network Protocol Stacks on Special-Purpose Embedded Systems [chapter]

Hyun-Wook Jin, Junbeom Yoo
2009 Lecture Notes in Computer Science  
In this paper, we aim to explore the design space of network protocol stacks for specialpurpose embedded systems.  ...  More precisely we discuss design alternatives for implementing new network protocol stacks over embedded operating systems, methodologies for verifying the network protocols, and the designs for network  ...  With respect to the formal verification of network protocol stacks, we have to consider two tasks: specification of protocol stacks and modeling of the system implementing the protocol.  ... 
doi:10.1007/978-3-642-10265-3_22 fatcat:ympjv5masrhhfdnsb56jeguxda

Applying Formal Methods to Networking: Theory, Techniques, and Applications

Junaid Qadir, Osman Hasan
2015 IEEE Communications Surveys and Tutorials  
This has also led to a great resurgence in interest of applying formal methods to specification, verification, and synthesis of networking protocols and applications.  ...  The lack of formalization of the Internet architecture meant limited abstractions and modularity, especially for the control and management planes, thus requiring for every new need a new protocol built  ...  These kinds of behaviors cannot be assessed using automated theorem provers and thus the most suitable approach to tackle the verification of networking protocols (essentially all the protocols used in  ... 
doi:10.1109/comst.2014.2345792 fatcat:oc6l6pn4tnddjbbr5v4gbbuycq

Finding Security Vulnerabilities in Network Protocol Implementations [article]

Kaled Alshmrany, Lucas Cordeiro
2020 arXiv   pre-print
We use fuzzing for an initial exploration of the network protocol, while symbolic execution explores both the program paths and protocol states, which were uncovered by fuzzing.  ...  In our preliminary evaluation, we used ESBMC, Map2Check, and KLEE as software verifiers and SPIKE as fuzzer to check their suitability to verify our network protocol implementations.  ...  Additionally, the diversity of network protocols in terms of protocol specifications and packets format also affects the accuracy of our experiments.  ... 
arXiv:2001.09592v1 fatcat:gwhsnn23ircg7cikfkksdir6ui


Youssef Hanna, Hridesh Rajan, Wensheng Zhang
2008 Proceedings of the first ACM conference on Wireless network security - WiSec '08  
models of intrusion and network topologies, and a technique for translating the results of the verification process to domain terms.  ...  The key contribution of this work is an approach for automated formal verification of sensor network security protocols.  ...  The authors would like to thank the anonymous reviewers of WiSec 2008 for their insightful comments that helped improve the presentation of the paper and to the participants of the Fourteenth ACM SIGSOFT  ... 
doi:10.1145/1352533.1352551 dblp:conf/wisec/HannaRZ08 fatcat:2iyy73unsrcx7l2gdc22iuke34

A Comparative Analysis of Tools for Testing the Security Protocols

Reham Abdellatif Abouhogail, Electrical Quantities Metrology Dept. National Institute of standards (NIS), Egypt
2019 International Journal of Information Technology and Computer Science  
In this paper, Analysis and comparison of two popular security verification tools namely Automated Validation of Internet Security Protocols and Applications (AVISPA) and Burrows-Abadi-Needham (BAN) logic  ...  As a case study, two previously proposed security protocols, which were tested before by BAN logic only are evaluated and proved using the automated verification tool AVISPA to ensure that these protocols  ...  The results of the analysis using OFMC of Improving the Handoff Latency of the Wireless Mesh Networks Standard protocol.  ... 
doi:10.5815/ijitcs.2019.12.03 fatcat:26a4gqgwvreq5i2yydx3xx6emi

From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

Tieming Chen, Zhenbo Yu, Shijian Li, Bo Chen
2016 Journal of Sensors  
At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN) and wireless body area networks (WBAN), formal modeling and verification for these domain-specific  ...  In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification.  ...  Acknowledgment This work is supported by National Science Foundation of China with Grant no. 61103044.  ... 
doi:10.1155/2016/8797568 fatcat:fuejnrv2drdv7pzu4vgolkin7q

Methodology for Formal Verification of Routing Protocols for Ad Hoc Wireless Networks

D. Camara, A. A. F. Loureiro, F. Filali
2007 IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference  
Filali Methodology for Formal Methodology for Formal Verification of Routing Protocols Verification of Routing Protocols for Ad Hoc Wireless Networks for Ad Hoc Wireless Networks  ...  Specific topologies, number of nodes  Not able to handle the dynamic behavior of the network Topology changes and mobility Methodology Methodology  Intend to be a simple and general  Step  ... 
doi:10.1109/glocom.2007.137 dblp:conf/globecom/CamaraLF07 fatcat:rrfb6wgggrbxvh3hisr6mwpi5u

UML-based modeling and formal verification of security protocols

Sara Mota, Benjamin Fontan
2005 Proceedings of the 2005 ACM conference on Emerging network experiment and technology - CoNEXT'05  
Among security protocols, key management protocols for group communication are very complex for formal verification because of their specific constraints (dynamicity, time, reliability and number of users  ...  II Verification methodology of security protocols Verification by abstraction is the technique used to study the modeled systems in TURTLE.  ... 
doi:10.1145/1095921.1095981 dblp:conf/conext/MotaF05 fatcat:bpqfmq2hv5dflg6pa7qryes77a

Page 127 of Journal of Research and Practice in Information Technology Vol. 28, Issue 4 [page]

1996 Journal of Research and Practice in Information Technology  
of the 15th International Symposium on Protocol Specification, Testing and Verification, 1995.  ...  ., CHU, P.M. and LIU, M.T. (1987): Protocol Verification Using Reachability Analysis: The State Space Explosion Problem and Relief Strategies, Proceedings of ACM SIGCOMM.  ... 


Youssef Hanna, Hridesh Rajan
2006 Software engineering notes  
The semantic gap between specification and implementation languages for sensor networks security protocols impedes the specification and verification of the protocols.  ...  We demonstrate the features of SLEDE through an example specification of the µTesla, secure broadcast protocol for sensor networks.  ...  CONCLUSION Impedance mismatch between current specification and implementation languages for sensor network security protocols makes specification and verification of the protocols hard.  ... 
doi:10.1145/1218776.1218801 fatcat:qik5znlwyfbejd4ewqkth7msja
« Previous Showing results 1 — 15 out of 129,374 results