Verifying a UMTS Protocol Using Spin and EASN

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using PROTEAN for Verifying a Complex Protocol - A Case Study

Communication protocols used in the field have always suffered from failures. Some of these faults are the result of design errors; others are the result of implementation errors. These errors dramatically increase maintenance cost and decrease software reliability. The best time to maintain software is during its design stage. A formal approach to developing a protocol is deemed necessary to i...

متن کامل

Verifying an ATM Protocol Using a Combination of Formal Techniques

ions of infinite state systems compositionally and automatically. In Proc. 10th Int. Conf. Computer Aided Verification (CAV’98), Vancouver, BC, Canada, June 28– July 2, pp. 319–331. Springer-Verlag, Berlin. [11] Burch, J. R., Clarke, E. M., McMillan, K. L., Dill, D. L. andHwang, L. J. (1992) Symbolic model checking: 10 states andbeyond. Inform. Comput., 98, 142–170. [12] Recommendation ...

متن کامل

Modeling and Verifying a Bounded Retransmission Protocol

This paper concerns the transfer of les via a lossy communication channel. It formally speciies this le transfer service in a property-oriented way and investigates|using two diierent techniques| whether a given bounded retransmission protocol conforms to this service. This protocol is based on the well-known alternating bit protocol but allows for a bounded number of retransmission of a frame,...

متن کامل

SPUR: A Secured Protocol for UMTS Registration

This paper presents a new scheme for mobile identification and registration in UMTS networks. Our approach attempts to alleviate different limitations observed with the current solutions (such as the 3GPP). It guarantees the protection of the data transmitted on the SIP messages during the registration procedure. Our method provides the authentication of the main entities involved in the regist...

متن کامل

Modeling and verifying the Ariadne protocol using process algebra

Mobile Ad Hoc Networks (MANETs) are formed dynamically by mobile nodes without the support of prior stationary infrastructures. In such networks, routing protocols, particularly secure ones are always the essential parts. Ariadne, an efficient and well-known on-demand secure protocol of MANETs, mainly concerns about how to prevent a malicious node from compromising the route. In this paper, we ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronic Notes in Theoretical Computer Science

سال: 2005

ISSN: 1571-0661

DOI: 10.1016/j.entcs.2004.11.007