Abstract
This paper deals with the novel evolutionary approach used for the automatic design of security protocols that also employs the novel grammatical generation of protocols according to the design and security requirements. The first part outlines the introduces security protocols Then, in the main part of this paper, we propose the new algorithm based on natural evolution that is utilized for the automated design of secure communication and security protocols. These protocols may be used for authentication, key distribution and/or for providing other security functions and properties.
Chapter PDF
Similar content being viewed by others
References
Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy, pp. 122–136. IEEE Computer Security Press, Los Alamitos (1994)
Abadi, M., Tuttle, N.: A Semantic for a Logic of Authentication. In: Proceedings of the ACM Symposium on Principles of Distributed Computing, pp. 201–216 (1991)
Agray, N., van der Hoek, W., de Vink, E.: On BAN Logics for Industrial Security protocols. In: CCEMAS, p. 8 (2001)
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)
Gritzalis, S.: Security protocols over open networks and distributed systems: Formal methods for their Analysis, Design and Verification. University of Aegean, Greece, Computer Communications 22(8), 695–707 (1999)
Ma, L., Tsai, J.: Formal Verification Techniques for Computer Communication Security Protocols. In: Handbook of Software Engineering and Knowledge Engineering, p. 23. World Scientific Publishing Company, Singapore (2000)
Očenášek, P., Trchalík, R.: Modal Logics Used for Authentication Protocols Analysis: Survey and Comparison. In: Proceedings of the 7th International Carpathian Control Conference, Ostrava, CZ, VŠB-Technical University of Ostrava, pp. 401–404 (2006)
Očenášek, P., Očenášek, J.: Designing Secure Communications Using Evolutionary Approach. In: Genetic and Evolutionary Computation Conference GECCO 2006, Seattle, WA, US. ACM, New York (2006)
Očenášek, P.: Towards Selected Problems in the Security Protocol Design and Verification. In: 1st Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, MEMICS, Znojmo, CZ (2005)
Shmatikov, V., Stern, U.: Efficient Finite-State Analysis for Large Security Protocols. In: Proceedings of the 11th IEEE Computer Security Foundation Workshop, p. 10. IEEE Computer Society Press, Los Alamitos (1998)
Alves-Foss, J., Soule, T.: A weakest precondition calculus for analysis of cryptographic protocols. In: DIMACS Workshop on Design and Formal Verification of Crypto Protocols (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ocenasek, P. (2009). An Approach for the Design of Secure Communication in Embedded Systems. In: Smith, M.J., Salvendy, G. (eds) Human Interface and the Management of Information. Designing Information Environments. Human Interface 2009. Lecture Notes in Computer Science, vol 5617. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02556-3_65
Download citation
DOI: https://doi.org/10.1007/978-3-642-02556-3_65
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02555-6
Online ISBN: 978-3-642-02556-3
eBook Packages: Computer ScienceComputer Science (R0)