Aljeaid, D., Ma, X. ORCID: 0000-0003-0074-4192 and Langensiepen, C. ORCID: 0000-0002-0165-9048, 2015. Analysis of security protocols using finite-state machines. International Journal of Advanced Research in Artificial Intelligence (IJARAI), 4 (4), pp. 46-53. ISSN 2165-4069
|
Text
219479_PubSub1926_Ma.pdf Download (933kB) | Preview |
Abstract
This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviour s together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay.
Item Type: | Journal article | ||||
---|---|---|---|---|---|
Publication Title: | International Journal of Advanced Research in Artificial Intelligence (IJARAI) | ||||
Creators: | Aljeaid, D., Ma, X. and Langensiepen, C. | ||||
Publisher: | Science and Information Organization Inc. | ||||
Date: | 2015 | ||||
Volume: | 4 | ||||
Number: | 4 | ||||
ISSN: | 2165-4069 | ||||
Identifiers: |
|
||||
Rights: | © 2015 The Science and Information (SAI) Organization Limited | ||||
Divisions: | Schools > School of Science and Technology | ||||
Record created by: | EPrints Services | ||||
Date Added: | 09 Oct 2015 09:57 | ||||
Last Modified: | 09 Jun 2017 13:15 | ||||
URI: | https://irep.ntu.ac.uk/id/eprint/5361 |
Actions (login required)
Edit View |
Views
Views per month over past year
Downloads
Downloads per month over past year