Cargando…

SAT and SMT-Based Verification of Security Protocols Including Time Aspects †

For many years various types of devices equipped with sensors have guaranteed proper work in a huge amount of machines and systems. For the proper operation of sensors, devices, and complex systems, we need secure communication. Security protocols (SP) in this case, guarantee the achievement of secu...

Descripción completa

Detalles Bibliográficos
Autores principales: Szymoniak, Sabina, Siedlecka-Lamch, Olga, Zbrzezny, Agnieszka M., Zbrzezny, Andrzej, Kurkowski, Miroslaw
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8123872/
https://www.ncbi.nlm.nih.gov/pubmed/33925606
http://dx.doi.org/10.3390/s21093055
_version_ 1783693038792474624
author Szymoniak, Sabina
Siedlecka-Lamch, Olga
Zbrzezny, Agnieszka M.
Zbrzezny, Andrzej
Kurkowski, Miroslaw
author_facet Szymoniak, Sabina
Siedlecka-Lamch, Olga
Zbrzezny, Agnieszka M.
Zbrzezny, Andrzej
Kurkowski, Miroslaw
author_sort Szymoniak, Sabina
collection PubMed
description For many years various types of devices equipped with sensors have guaranteed proper work in a huge amount of machines and systems. For the proper operation of sensors, devices, and complex systems, we need secure communication. Security protocols (SP) in this case, guarantee the achievement of security goals. However, the design of SP is not an easy process. Sometimes SP cannot realise their security goals because of errors in their constructions and need to be investigated and verified in the case of their correctness. Now SP uses often time primitives due to the necessity of security dependence on the passing of time. In this work, we propose and investigate the SAT-and SMT-based formal verification methods of SP used in communication between devices equipped with sensors. For this, we use a formal model based on networks of communicating timed automata. Using this, we show how the security property of SP dedicated to the sensors world can be verified. In our work, we investigate such timed properties as delays in the network and lifetimes. The delay in the network is the lower time constraint related to sending the message. Lifetime is an upper constraint related to the validity of the timestamps generated for the transmitted messages.
format Online
Article
Text
id pubmed-8123872
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-81238722021-05-16 SAT and SMT-Based Verification of Security Protocols Including Time Aspects † Szymoniak, Sabina Siedlecka-Lamch, Olga Zbrzezny, Agnieszka M. Zbrzezny, Andrzej Kurkowski, Miroslaw Sensors (Basel) Article For many years various types of devices equipped with sensors have guaranteed proper work in a huge amount of machines and systems. For the proper operation of sensors, devices, and complex systems, we need secure communication. Security protocols (SP) in this case, guarantee the achievement of security goals. However, the design of SP is not an easy process. Sometimes SP cannot realise their security goals because of errors in their constructions and need to be investigated and verified in the case of their correctness. Now SP uses often time primitives due to the necessity of security dependence on the passing of time. In this work, we propose and investigate the SAT-and SMT-based formal verification methods of SP used in communication between devices equipped with sensors. For this, we use a formal model based on networks of communicating timed automata. Using this, we show how the security property of SP dedicated to the sensors world can be verified. In our work, we investigate such timed properties as delays in the network and lifetimes. The delay in the network is the lower time constraint related to sending the message. Lifetime is an upper constraint related to the validity of the timestamps generated for the transmitted messages. MDPI 2021-04-27 /pmc/articles/PMC8123872/ /pubmed/33925606 http://dx.doi.org/10.3390/s21093055 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Szymoniak, Sabina
Siedlecka-Lamch, Olga
Zbrzezny, Agnieszka M.
Zbrzezny, Andrzej
Kurkowski, Miroslaw
SAT and SMT-Based Verification of Security Protocols Including Time Aspects †
title SAT and SMT-Based Verification of Security Protocols Including Time Aspects †
title_full SAT and SMT-Based Verification of Security Protocols Including Time Aspects †
title_fullStr SAT and SMT-Based Verification of Security Protocols Including Time Aspects †
title_full_unstemmed SAT and SMT-Based Verification of Security Protocols Including Time Aspects †
title_short SAT and SMT-Based Verification of Security Protocols Including Time Aspects †
title_sort sat and smt-based verification of security protocols including time aspects †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8123872/
https://www.ncbi.nlm.nih.gov/pubmed/33925606
http://dx.doi.org/10.3390/s21093055
work_keys_str_mv AT szymoniaksabina satandsmtbasedverificationofsecurityprotocolsincludingtimeaspects
AT siedleckalamcholga satandsmtbasedverificationofsecurityprotocolsincludingtimeaspects
AT zbrzeznyagnieszkam satandsmtbasedverificationofsecurityprotocolsincludingtimeaspects
AT zbrzeznyandrzej satandsmtbasedverificationofsecurityprotocolsincludingtimeaspects
AT kurkowskimiroslaw satandsmtbasedverificationofsecurityprotocolsincludingtimeaspects