Automated verification of a key management architecture for hierarchical group protocols
نویسندگان
چکیده
Emerging applications require secure group communications around hierarchical architecture protocols, like military or public emergency applications. However, conceiving such secure hierarchical protocols is not straightforward. Thus, their verification become a primordial issue in order to avoid the possible security attacks and vulnerabilities. Several attempts have been done to deal with formal verification of group protocols, but, in our knowledge, none of them has handled hierarchical ones. This paper investigates both specific challenges and security issues of hierarchical security group communications, and an overview of works done for their verification. We have chosen the Back-end Cl-AtSe of AVISPA tool, to verify an example of such protocols, as it enables to deal with the exponentiation of Diffie-Hellman often used in group key management.
منابع مشابه
Rank Functions Based Inference System for Group Key Management Protocols Verification
Design and verification of cryptographic protocols has been under investigation for quite sometime. However, most of the attention has been paid for two parties protocols. In group key management and distribution protocols, keys are computed dynamically through cooperation of all protocol participants. Therefore regular approaches for two parties protocols verification cannot be applied on grou...
متن کاملAn Empirical Analysis of Automated Verification of Wireless Security Protocols
Formal verification of security protocols is an important step in the design of security protocols. It helps to reduce the potential of designing faulty protocols and thus increases the confidence in their use. Automated techniques reduce the potential for human errors during verification. This paper presents an empirical study of an automated proving system on the analysis of two wireless comm...
متن کاملA key management architecture and protocols for secure smart grid communications
Providing encrypted communications among power grid components is expected to be a basic requirement of smart grid systems in the future. Here, we propose a key management architecture and associated protocols tailored to support encrypted smart grid communications. The architecture consists of two levels structured around the grid control system hierarchy. At the top level, which consist of co...
متن کاملNetwork Working Group M. Baugher Request for Comments: 4046
This document defines the common architecture for Multicast Security (MSEC) key management protocols to support a variety of application, transport, and network layer security protocols. It also defines the group security association (GSA), and describes the key management protocols that help establish a GSA. The framework and guidelines described in this document permit a modular and flexible ...
متن کاملVarious Hierarchical Routing Protocols in Wireless Sensor Network: A Survey
In a hierarchical architecture, higher energy nodes can be used to process and send the information while low energy nodes can be used to perform the sensing in the proximity of the target. This means that creation of clusters and assigning special tasks to cluster heads can greatly contribute to overall system scalability, lifetime, and energy efficiency. Hierarchical routing is an efficient w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Annales des Télécommunications
دوره 62 شماره
صفحات -
تاریخ انتشار 2007