Verifying a UMTS Protocol Using Spin and EASN
نویسندگان
چکیده
منابع مشابه
Using PROTEAN for Verifying a Complex Protocol - A Case Study
Communication protocols used in the field have always suffered from failures. Some of these faults are the result of design errors; others are the result of implementation errors. These errors dramatically increase maintenance cost and decrease software reliability. The best time to maintain software is during its design stage. A formal approach to developing a protocol is deemed necessary to i...
متن کاملVerifying an ATM Protocol Using a Combination of Formal Techniques
ions of infinite state systems compositionally and automatically. In Proc. 10th Int. Conf. Computer Aided Verification (CAV’98), Vancouver, BC, Canada, June 28– July 2, pp. 319–331. Springer-Verlag, Berlin. [11] Burch, J. R., Clarke, E. M., McMillan, K. L., Dill, D. L. andHwang, L. J. (1992) Symbolic model checking: 10 states andbeyond. Inform. Comput., 98, 142–170. [12] Recommendation ...
متن کاملModeling and Verifying a Bounded Retransmission Protocol
This paper concerns the transfer of les via a lossy communication channel. It formally speciies this le transfer service in a property-oriented way and investigates|using two diierent techniques| whether a given bounded retransmission protocol conforms to this service. This protocol is based on the well-known alternating bit protocol but allows for a bounded number of retransmission of a frame,...
متن کاملSPUR: A Secured Protocol for UMTS Registration
This paper presents a new scheme for mobile identification and registration in UMTS networks. Our approach attempts to alleviate different limitations observed with the current solutions (such as the 3GPP). It guarantees the protection of the data transmitted on the SIP messages during the registration procedure. Our method provides the authentication of the main entities involved in the regist...
متن کاملModeling and verifying the Ariadne protocol using process algebra
Mobile Ad Hoc Networks (MANETs) are formed dynamically by mobile nodes without the support of prior stationary infrastructures. In such networks, routing protocols, particularly secure ones are always the essential parts. Ariadne, an efficient and well-known on-demand secure protocol of MANETs, mainly concerns about how to prevent a malicious node from compromising the route. In this paper, we ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Notes in Theoretical Computer Science
سال: 2005
ISSN: 1571-0661
DOI: 10.1016/j.entcs.2004.11.007