Abstract
For protocol analysis, we have to capture the protocol specification, the security goals of the protocol, and the communications environment it is expected to run in. In the research literature, the emphasis is usually on verification techniques and on the modelling of security properties, while in most cases the default for the communications environment is an unstructured network totally controlled by the attacker. This paper will argue that for the analysis of the kind of protocols developed today, more specific models of the communications network are required. To support this argument, a number of recently proposed security protocols with novel features will be briefly discussed.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP). RFC 3775 (June 2004)
Aura, T., Roe, M., Arkko, J.: Security of Internet location management. In: Proceedings of the 18th Annual Computer Security Applications Conference, December 2002, pp. 78–87 (2002)
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. DEC Systems Research Center, Report 39 (revised February 22, 1990)
Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory IT-29(2), 198–208 (1983)
Gollmann, D.: Authentication by correspondence. IEEE Journal on Selected Areas in Communications 21(1), 88–95 (2003)
Gollmann, D.: Challenges in protocol design and analysis. In: Tygar, J.D., Lee, D.T., Shieh, S.P. (eds.) Computer Security in the 21st Century, pp. 7–22. Springer, Heidelberg (2005)
Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. RFC 3775 (June 2004)
Meadows, C., Pavlovic, D.: Deriving, attacking and defending the gdoi protocol. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 53–72. Springer, Heidelberg (2004)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21, 993–999 (1978)
Tschofenig, H., Gurtov, A., Nagarajan, A., Shanmugam, M., Ylitalo, J.: Traversing middleboxes with the host identity protocol. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 17–28. Springer, Heidelberg (2005)
Vogt, H.: Integrity preservation for communication in sensor networks. Technical Report 434, ETH Zürich (February 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gollmann, D. (2005). Protocol Analysis for Concrete Environments. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds) Computer Aided Systems Theory – EUROCAST 2005. EUROCAST 2005. Lecture Notes in Computer Science, vol 3643. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11556985_47
Download citation
DOI: https://doi.org/10.1007/11556985_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29002-5
Online ISBN: 978-3-540-31829-3
eBook Packages: Computer ScienceComputer Science (R0)