Aljeaid, D, Ma, X ORCID: https://orcid.org/0000-0003-0074-4192 and Langensiepen, C ORCID: https://orcid.org/0000-0002-0165-9048, 2015. Analysis of security protocols using finite-state machines. International Journal of Advanced Research in Artificial Intelligence (IJARAI), 4 (4), pp. 46-53. ISSN 2165-4069
Preview |
Text
219479_PubSub1926_Ma.pdf Download (933kB) | Preview |
Abstract
This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviour s together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay.
Item Type: | Journal article |
---|---|
Publication Title: | International Journal of Advanced Research in Artificial Intelligence (IJARAI) |
Creators: | Aljeaid, D., Ma, X. and Langensiepen, C. |
Publisher: | Science and Information Organization Inc. |
Date: | 2015 |
Volume: | 4 |
Number: | 4 |
ISSN: | 2165-4069 |
Identifiers: | Number Type 10.14569/IJARAI.2015.040407 DOI |
Rights: | © 2015 The Science and Information (SAI) Organization Limited |
Divisions: | Schools > School of Science and Technology |
Record created by: | EPrints Services |
Date Added: | 09 Oct 2015 09:57 |
Last Modified: | 09 Jun 2017 13:15 |
URI: | https://irep.ntu.ac.uk/id/eprint/5361 |
Actions (login required)
Edit View |
Statistics
Views
Views per month over past year
Downloads
Downloads per month over past year