Automated verification of a key management architecture for hierarchical group protocols

نویسندگان

  • Mohamed Salah Bouassida
  • Najah Chridi
  • Isabelle Chrisment
  • Olivier Festor
  • Laurent Vigneron
چکیده

Emerging applications require secure group communications around hierarchical architecture protocols, like military or public emergency applications. However, conceiving such secure hierarchical protocols is not straightforward. Thus, their verification become a primordial issue in order to avoid the possible security attacks and vulnerabilities. Several attempts have been done to deal with formal verification of group protocols, but, in our knowledge, none of them has handled hierarchical ones. This paper investigates both specific challenges and security issues of hierarchical security group communications, and an overview of works done for their verification. We have chosen the Back-end Cl-AtSe of AVISPA tool, to verify an example of such protocols, as it enables to deal with the exponentiation of Diffie-Hellman often used in group key management.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rank Functions Based Inference System for Group Key Management Protocols Verification

Design and verification of cryptographic protocols has been under investigation for quite sometime. However, most of the attention has been paid for two parties protocols. In group key management and distribution protocols, keys are computed dynamically through cooperation of all protocol participants. Therefore regular approaches for two parties protocols verification cannot be applied on grou...

متن کامل

An Empirical Analysis of Automated Verification of Wireless Security Protocols

Formal verification of security protocols is an important step in the design of security protocols. It helps to reduce the potential of designing faulty protocols and thus increases the confidence in their use. Automated techniques reduce the potential for human errors during verification. This paper presents an empirical study of an automated proving system on the analysis of two wireless comm...

متن کامل

A key management architecture and protocols for secure smart grid communications

Providing encrypted communications among power grid components is expected to be a basic requirement of smart grid systems in the future. Here, we propose a key management architecture and associated protocols tailored to support encrypted smart grid communications. The architecture consists of two levels structured around the grid control system hierarchy. At the top level, which consist of co...

متن کامل

Network Working Group M. Baugher Request for Comments: 4046

This document defines the common architecture for Multicast Security (MSEC) key management protocols to support a variety of application, transport, and network layer security protocols. It also defines the group security association (GSA), and describes the key management protocols that help establish a GSA. The framework and guidelines described in this document permit a modular and flexible ...

متن کامل

Various Hierarchical Routing Protocols in Wireless Sensor Network: A Survey

In a hierarchical architecture, higher energy nodes can be used to process and send the information while low energy nodes can be used to perform the sensing in the proximity of the target. This means that creation of clusters and assigning special tasks to cluster heads can greatly contribute to overall system scalability, lifetime, and energy efficiency. Hierarchical routing is an efficient w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Annales des Télécommunications

دوره 62  شماره 

صفحات  -

تاریخ انتشار 2007