Cargando…
SAT and SMT-Based Verification of Security Protocols Including Time Aspects †
For many years various types of devices equipped with sensors have guaranteed proper work in a huge amount of machines and systems. For the proper operation of sensors, devices, and complex systems, we need secure communication. Security protocols (SP) in this case, guarantee the achievement of secu...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8123872/ https://www.ncbi.nlm.nih.gov/pubmed/33925606 http://dx.doi.org/10.3390/s21093055 |
_version_ | 1783693038792474624 |
---|---|
author | Szymoniak, Sabina Siedlecka-Lamch, Olga Zbrzezny, Agnieszka M. Zbrzezny, Andrzej Kurkowski, Miroslaw |
author_facet | Szymoniak, Sabina Siedlecka-Lamch, Olga Zbrzezny, Agnieszka M. Zbrzezny, Andrzej Kurkowski, Miroslaw |
author_sort | Szymoniak, Sabina |
collection | PubMed |
description | For many years various types of devices equipped with sensors have guaranteed proper work in a huge amount of machines and systems. For the proper operation of sensors, devices, and complex systems, we need secure communication. Security protocols (SP) in this case, guarantee the achievement of security goals. However, the design of SP is not an easy process. Sometimes SP cannot realise their security goals because of errors in their constructions and need to be investigated and verified in the case of their correctness. Now SP uses often time primitives due to the necessity of security dependence on the passing of time. In this work, we propose and investigate the SAT-and SMT-based formal verification methods of SP used in communication between devices equipped with sensors. For this, we use a formal model based on networks of communicating timed automata. Using this, we show how the security property of SP dedicated to the sensors world can be verified. In our work, we investigate such timed properties as delays in the network and lifetimes. The delay in the network is the lower time constraint related to sending the message. Lifetime is an upper constraint related to the validity of the timestamps generated for the transmitted messages. |
format | Online Article Text |
id | pubmed-8123872 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-81238722021-05-16 SAT and SMT-Based Verification of Security Protocols Including Time Aspects † Szymoniak, Sabina Siedlecka-Lamch, Olga Zbrzezny, Agnieszka M. Zbrzezny, Andrzej Kurkowski, Miroslaw Sensors (Basel) Article For many years various types of devices equipped with sensors have guaranteed proper work in a huge amount of machines and systems. For the proper operation of sensors, devices, and complex systems, we need secure communication. Security protocols (SP) in this case, guarantee the achievement of security goals. However, the design of SP is not an easy process. Sometimes SP cannot realise their security goals because of errors in their constructions and need to be investigated and verified in the case of their correctness. Now SP uses often time primitives due to the necessity of security dependence on the passing of time. In this work, we propose and investigate the SAT-and SMT-based formal verification methods of SP used in communication between devices equipped with sensors. For this, we use a formal model based on networks of communicating timed automata. Using this, we show how the security property of SP dedicated to the sensors world can be verified. In our work, we investigate such timed properties as delays in the network and lifetimes. The delay in the network is the lower time constraint related to sending the message. Lifetime is an upper constraint related to the validity of the timestamps generated for the transmitted messages. MDPI 2021-04-27 /pmc/articles/PMC8123872/ /pubmed/33925606 http://dx.doi.org/10.3390/s21093055 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Szymoniak, Sabina Siedlecka-Lamch, Olga Zbrzezny, Agnieszka M. Zbrzezny, Andrzej Kurkowski, Miroslaw SAT and SMT-Based Verification of Security Protocols Including Time Aspects † |
title | SAT and SMT-Based Verification of Security Protocols Including Time Aspects † |
title_full | SAT and SMT-Based Verification of Security Protocols Including Time Aspects † |
title_fullStr | SAT and SMT-Based Verification of Security Protocols Including Time Aspects † |
title_full_unstemmed | SAT and SMT-Based Verification of Security Protocols Including Time Aspects † |
title_short | SAT and SMT-Based Verification of Security Protocols Including Time Aspects † |
title_sort | sat and smt-based verification of security protocols including time aspects † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8123872/ https://www.ncbi.nlm.nih.gov/pubmed/33925606 http://dx.doi.org/10.3390/s21093055 |
work_keys_str_mv | AT szymoniaksabina satandsmtbasedverificationofsecurityprotocolsincludingtimeaspects AT siedleckalamcholga satandsmtbasedverificationofsecurityprotocolsincludingtimeaspects AT zbrzeznyagnieszkam satandsmtbasedverificationofsecurityprotocolsincludingtimeaspects AT zbrzeznyandrzej satandsmtbasedverificationofsecurityprotocolsincludingtimeaspects AT kurkowskimiroslaw satandsmtbasedverificationofsecurityprotocolsincludingtimeaspects |