Formal Analysis of Security Protocols with Movement

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

93 Downloads (Pure)

Abstract

Standard approaches to the formal and automated analysis of security protocols typically do not consider explicitly the fact that certain protocols require the agents to move to specific locations in order to send or receive particular messages. In this paper, we formalise a formal and automated approach in which security protocols with explicit agent movement are analysed in the presence of a Dolev-Yao attacker. We define movements as timed processes in an applied pi-calculus that allows us to build traces that show how the location and the movements of the agents and of the attacker significantly affect the execution of a protocol as well as the execution of possible attacks. We have automated our approach by using the UPPAAL tool. As proof-of-concept, we show our approach in action by analysing several security properties of a concrete case study, the SegCom protocol for vehicular ad-hoc networks.
Original languageEnglish
Title of host publicationITASEC 2023: The Italian Conference on CyberSecurity
PublisherCEUR Workshop Proceedings
Number of pages16
Publication statusAccepted/In press - 28 Mar 2023

Fingerprint

Dive into the research topics of 'Formal Analysis of Security Protocols with Movement'. Together they form a unique fingerprint.

Cite this