Abstract
In order to evaluate the influence of cryptographic protocols on the property of communication networks, the method of simulation was adopted. Firstly, a 9-tuples abstract model of cryptographic protocols based on Finite State Machine (FSM) was given, and the process for building FSM models was provided. Secondly, by analyzing the FSM simulation theory of OMNeT++ platform, a dynamic behavior algorithm of simulation models was designed. Thirdly, the validity of the modeling and simulation strategies were tested by taking Internet Key Exchange (IKEv2) protocol as an example and designing a simulation scene of Denial of Service (DoS) attack, and then the usability of cryptographic protocols was analyzed. The simulation results show that, the modeling and simulation strategies are valid, and the average time delay of point to point is approximately increased by 12 % when using IKEv2 protocol in communication networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Meadows C (2011) Formal analysis of cryptographic protocols. Encycl Cryptogr Secur 490–492
Liu S, Ye J (2012) Computational rationality of formal analysis on cryptographic protocols. In: Proceedings of the ICCIS. IEEE, pp 904–907
Meadows C (2015) Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later. Logic, rewriting, and concurrency. Springer International Publishing, New York, pp 475–492
Blanchet B (2012) Security protocol verification: symbolic and computational models. In: Proceedings of the POST12. Springer, New York, pp 3–29
Meier S, Schmidt B, Cremers C et al (2013) The TAMARIN prover for the symbolic analysis of security protocols. Computer aided verification. Springer, Berlin, pp 696–701
Pankova A, Laud P (2012) Symbolic analysis of cryptographic protocols containing bilinear pairings. In: Proceedings of CSF. IEEE
Brand D, Zafiropulo P (1983) On communicating finite-state machines. J ACM (JACM) 30(2):323–342
Aarts F, Jonsson B, Uijen J et al (2014) Generating models of infinite-state communication protocols using regular inference with abstraction. Form Methods Syst Des 46(1):1–41
Varga A (2014) OMNeT++ user manual version 4.6. http://www.omnetpp.org/doc/omnetpp/manual.html
Kaufman C, Hoffman P, Nir Y et al (2014) Internet key exchange protocol version 2 (IKEv2). IETF
Kasraoui M, Cabani A, Chafouk H (2014) IKEv2 authentication exchange model in NS-2. In: Proceedings of the IS3C. IEEE, pp 1074–1077
Patel H, Jinwala D (2013) Modeling and analysis of internet key exchange protocolv2 and a proposal for its variant. In: Proceedings of the 6th ACM India computing convention. ACM
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhang, Mq., Dong, Sq., Kong, Hs., Liu, Xh., Guan, H. (2017). Modeling and Simulation Strategies of Cryptographic Protocols Based on Finite State Machine. In: Balas, V., Jain, L., Zhao, X. (eds) Information Technology and Intelligent Transportation Systems. Advances in Intelligent Systems and Computing, vol 454. Springer, Cham. https://doi.org/10.1007/978-3-319-38789-5_62
Download citation
DOI: https://doi.org/10.1007/978-3-319-38789-5_62
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-38787-1
Online ISBN: 978-3-319-38789-5
eBook Packages: EngineeringEngineering (R0)