Vérification automatique de protocoles d'examen, de monnaie, de réputation, et de routage. (Automated Verification of Exam, Cash, aa Reputation, and Routing Protocols)
نویسنده
چکیده
Security is a crucial requirement in the applications based on information and communication technology, especially when an open network such as the Internet is used. To ensure security in such applications several security protocols have been developed. However, the design of complex security protocols is notoriously difficult and error-prone. Several flaws have been found on protocols that are claimed secure. Hence, security protocols must be verified before they are used. One approach to verify security protocols is the use of formal methods. The use of formal methods has enabled the discovery of several flaws on security protocols, as well as, the proof of some other protocols’ correctness. However, errors can be introduced when the protocols are implemented. Another approach which can be used to verify implementations individual executions is runtime verification. Runtime verification mainly can help in the cases where verifying implementations formally is complex and difficult. In this thesis we contribute to security protocol verification with an emphasis on formal verification and automation. Firstly, we study exam protocols. We propose formal definitions for several authentication and privacy properties in the Applied πCalculus. We also provide an abstract definitions of verifiability properties. We analyze all these properties automatically using ProVerif on multiple case studies, and identify several flaws. Moreover, we propose several monitors to check exam requirements at runtime. These monitors are validated by analyzing a real exam implementation using MarQ tool. Secondly, we propose a formal framework to verify the security properties of non-transferable electronic cash protocols. We define client privacy and forgery related properties. Again, we illustrate our model by analyzing three case studies using ProVerif, and we re-discover known attacks. Thirdly, we propose formal definitions for authentication, privacy, and verifiability properties of electronic reputation protocols. We discuss the proposed definitions, with the help of ProVerif, on a simple reputation protocol. Finally, we obtain a reduction result to verify route validity of ad-hoc routing protocols in presence of multiple independent attackers.
منابع مشابه
Exploiting Asymmetric Links in a Convergecast Routing Protocol for Wireless Sensor Networks
Most of the existing routing protocol designed for WSNs assume that links are symmetric which is in contradiction to the reality of these networks. Indeed, asymmetric links cannot be ignored in WSNs as they can be predominant. The apparition of asymmetric links can dramatically decrease routing protocols that are not designed to support them by decreasing the delivery ratio and increasing the d...
متن کاملConstraints-based Verification of Parameterized Cryptographic Protocols
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. Although many works have been dedicated to standard protocols like Needham-Schroder very few address the more challenging class of group protocols. We present a synchronous model for group protocols, that generalizes st...
متن کاملAbstractions pour la vérification de propriétés de sécurité de protocoles cryptographiques. (Abstractions for verification of security properties of cryptographic protocols)
ions pour la vérification de propriétés de sécurité de protocoles cryptographiques Soutenue le 19 septembre 2003 Composition du jury : – Michel Bidoit Directeur de thèse – Paul Gastin Président du jury – Jean Goubault-Larrecq Examinateur – Francis Klay Examinateur – Yassine Lakhnech Rapporteur – Jean-François Raskin Rapporteur
متن کاملDelay Tolerant Routing with OLSRv2
This memorandum proposes a simple mechanism for enabling basic delay tolerant networking with off-the-shelf MANET routing protocols – with the objective being to enable trading off slightly longer data delivery delays against resilience to a temporary lack of connectivity between a router and the ultimate destination of an IP datagram. As part of testing the benefit of said mechanism, an extrem...
متن کاملAmélioration de la Performance des Protocoles Routage et MAC pour une Meilleure QoS dans un MANET
Résumé—L’un des problèmes très sérieux auxquels est confronté un MANET (Mobile Ad hoc Network) est la durée de vie très limitée de ses nœuds mobiles. Ce qui amplifie cette contrainte est l’absence d’échange d’informations sur l’état des nœuds mobiles entre le protocole MAC (Medium Acces Control) et le protocole de routage qui, en plus de leurs fonctionnalités, peuvent supporter des mécanismes d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015