Skip to main content

Modeling and Simulation Strategies of Cryptographic Protocols Based on Finite State Machine

  • Conference paper
  • First Online:
Information Technology and Intelligent Transportation Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 454))

Abstract

In order to evaluate the influence of cryptographic protocols on the property of communication networks, the method of simulation was adopted. Firstly, a 9-tuples abstract model of cryptographic protocols based on Finite State Machine (FSM) was given, and the process for building FSM models was provided. Secondly, by analyzing the FSM simulation theory of OMNeT++ platform, a dynamic behavior algorithm of simulation models was designed. Thirdly, the validity of the modeling and simulation strategies were tested by taking Internet Key Exchange (IKEv2) protocol as an example and designing a simulation scene of Denial of Service (DoS) attack, and then the usability of cryptographic protocols was analyzed. The simulation results show that, the modeling and simulation strategies are valid, and the average time delay of point to point is approximately increased by 12 % when using IKEv2 protocol in communication networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Meadows C (2011) Formal analysis of cryptographic protocols. Encycl Cryptogr Secur 490–492

    Google Scholar 

  2. Liu S, Ye J (2012) Computational rationality of formal analysis on cryptographic protocols. In: Proceedings of the ICCIS. IEEE, pp 904–907

    Google Scholar 

  3. Meadows C (2015) Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later. Logic, rewriting, and concurrency. Springer International Publishing, New York, pp 475–492

    Google Scholar 

  4. Blanchet B (2012) Security protocol verification: symbolic and computational models. In: Proceedings of the POST12. Springer, New York, pp 3–29

    Google Scholar 

  5. Meier S, Schmidt B, Cremers C et al (2013) The TAMARIN prover for the symbolic analysis of security protocols. Computer aided verification. Springer, Berlin, pp 696–701

    Google Scholar 

  6. Pankova A, Laud P (2012) Symbolic analysis of cryptographic protocols containing bilinear pairings. In: Proceedings of CSF. IEEE

    Google Scholar 

  7. Brand D, Zafiropulo P (1983) On communicating finite-state machines. J ACM (JACM) 30(2):323–342

    Google Scholar 

  8. Aarts F, Jonsson B, Uijen J et al (2014) Generating models of infinite-state communication protocols using regular inference with abstraction. Form Methods Syst Des 46(1):1–41

    Article  MATH  Google Scholar 

  9. Varga A (2014) OMNeT++ user manual version 4.6. http://www.omnetpp.org/doc/omnetpp/manual.html

  10. Kaufman C, Hoffman P, Nir Y et al (2014) Internet key exchange protocol version 2 (IKEv2). IETF

    Google Scholar 

  11. Kasraoui M, Cabani A, Chafouk H (2014) IKEv2 authentication exchange model in NS-2. In: Proceedings of the IS3C. IEEE, pp 1074–1077

    Google Scholar 

  12. Patel H, Jinwala D (2013) Modeling and analysis of internet key exchange protocolv2 and a proposal for its variant. In: Proceedings of the 6th ACM India computing convention. ACM

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shu-qin Dong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhang, Mq., Dong, Sq., Kong, Hs., Liu, Xh., Guan, H. (2017). Modeling and Simulation Strategies of Cryptographic Protocols Based on Finite State Machine. In: Balas, V., Jain, L., Zhao, X. (eds) Information Technology and Intelligent Transportation Systems. Advances in Intelligent Systems and Computing, vol 454. Springer, Cham. https://doi.org/10.1007/978-3-319-38789-5_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-38789-5_62

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-38787-1

  • Online ISBN: 978-3-319-38789-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics