Skip to main content

Symbolic Model Checking of Security Protocols for Ad hoc Networks on any Topologies

  • Chapter
  • First Online:
Transactions on Petri Nets and Other Models of Concurrency X

Part of the book series: Lecture Notes in Computer Science ((TOPNOC,volume 9410))

Abstract

Petri nets have proved their effectiveness in modeling and formal verification of a large number of applications: control systems, communication protocols, application workflows, hardware design, etc. In the present days, one important focus of computer science is on security and secure communications. The use of Petri nets for verifying security properties is not a mature field due to a lack of convenient modeling and verification capabilities. So far, in the Petri Net field there is only CPN Tools that is mature enough for modeling, using the colored Petri nets formalism. Nevertheless such verifications cannot be performed on large systems as CPN Tools is based on an exhaustive way of computing the semantics of a model. In this paper we present the use of AlPiNA, another candidate for this task. AlPiNA is a symbolic model checker that uses the formalism of algebraic Petri nets. We have used it successfully for modeling ad hoc networks and for verifying security protocols designed for this type of networks. As a case study and benchmark we have chosen the ARAN secure routing protocol. We managed to find all the attacks that were already reported for this protocol. To our knowledge this work is also the first successful attempt to use Petri nets for model checking the security properties of ad hoc networks protocols.

This work has been partially supported by the SCIEX SARPOT project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hostettler, S.P.: High-level Petri net model checking: the symbolic way, Ph.D. thesis, University of Geneva (2011)

    Google Scholar 

  2. Permpoontanalarp, Y., Sornkhom, P.: A new colored petri net methodology for the security analysis of cryptographic protocols. In: The 10th Workshop and Tutorial on Practical Use of Colored Petri Nets and the CPN Tools, Denmark, pp. 81–100 (2009)

    Google Scholar 

  3. Buchs, D., Hostettler, S., Marechal, A., Risoldi, M.: AlPiNA: a symbolic model checker. In: Lilius, J., Penczek, W. (eds.) PETRI NETS 2010. LNCS, vol. 6128, pp. 287–296. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  4. Hostettler, S.P., Marechal, A., Linard, A., Risoldi, M., Buchs, D.: High-level petri net model checking with AlPiNA. Fundamenta Informaticae, 113(3–4), August 2011, ISSN 0169–2968, 229–264 (2011)

    Google Scholar 

  5. AlPiNA tool web page, 10 March 2015. http://alpina.unige.ch/

  6. Sanzgiri, K., Dahill, B.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols, pp. 78–87 (2002)

    Google Scholar 

  7. Khoukhi, L., Cherkaui, S.: Intelligent solution for congestion control in wireless ad hoc networks. In: WONS 2006: Third Annual Conference on Wireless On-demand Network Systems and Services, pp. 10–19 (2006)

    Google Scholar 

  8. Chiang, T-C., Huang, Z-M.: Multicast routing representation in ad hoc networks using fuzzy petri nets. In: Proceedings of the 18th International Conference on Advanced Information Networking and Application, vol. 2, p. 420 (2004)

    Google Scholar 

  9. Zhang, C., Zhou, M.: A stochastic petri net approach to modeling and analysis of ad hoc network. In: Proceedings of the International Conference on Information Technology: Research and Education, pp. 152–156 (2003)

    Google Scholar 

  10. Beccuti, M., De Pierro, M., Horvath, A., Horvath, A., Farkas, K.: A mean field based methodology for modeling mobility in ad hoc networks. In: IEEE 73rd, Vehicular Technology Conference (VTC Spring), 2011, pp. 1–5 (2011)

    Google Scholar 

  11. Prasad, P., Singh, B., Sahoo, A.K.: Validation of Routing Protocol for Mobile Ad Hoc Networks using Colored Petri Nets, bachelor thesis. National Institute of Technology, Rourkela (2009)

    Google Scholar 

  12. Xiong, C., Murata, T., Tsai, J.: Modeling and simulation of routing protocol for mobile ad hoc networks using colored petri nets. Proc. Conf. Appl. Theory Petri Nets Formal Meth. Software Eng. De-fence Syst. 12, 145–153 (2002)

    Google Scholar 

  13. Jamali, M.A.J., Khosravi, T.: Validation of ad hoc on-demand multipath distance vector using colored petri nets. Int. Conf. Comput. Softw. Model. Singap. 14, 29–34 (2011)

    Google Scholar 

  14. Espensen, K.L., Kjeldsen, M.K., Kristensen, L.M.: Modelling and initial validation of the DYMO routing protocol for mobile ad-hoc networks. In: van Hee, K.M., Valk, R. (eds.) PETRI NETS 2008. LNCS, vol. 5062, pp. 152–170. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  15. Permpoontanalarp, Y., Changkhanak, A.: Security Analysis of the TMN protocol by using colored petri nets: on-the-fly trace generation method and homomorphic property In: The 8th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 63–68 (2011)

    Google Scholar 

  16. Yang, X.: Modeling and analysis of security protocols using colored petri nets. J. Comput. 6(1), 19–27 (2011)

    Google Scholar 

  17. Golas, U., Hoffman, K., Ehrig, H., Rein, A., Padberg, J.: Functional analysis of algebraic higher-order net systems with applications to mobile ad-hoc networks. Bulletin EATCS 101, 148–160 (2010)

    Google Scholar 

  18. Padberg, J., Ehrig, H., Ribeiro, L.: Formal modeling and analysis of flexible processes in mobile ad-hoc networks. Bulletin EATCS, 128–132 (2007)

    Google Scholar 

  19. Ehrig, H., Mahr, B.: Fundamentals of Algebraic Specification 1: Equations and Initial Semantics. Monographs in Theoretical Computer Science, An EATCS Series. Springer, Heidelberg (1985)

    Book  MATH  Google Scholar 

  20. Ayar, A., Marin, M.: Unifying the syntax and semantics of modular extensions of Petri nets, Ph.D. thesis, University of Geneva (2013)

    Google Scholar 

  21. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  22. Benetti, D., Merro, M., Vigano, L.: Model checking ad hoc network routing protocols: ARAN vs. endairA. In: The 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM), pp. 191–202 (2010)

    Google Scholar 

  23. Viana, A.C., Maag, S., Zaidi, F.: One step forward: linking wireless self-organising networks validation techniques with formal testing approaches, ACM Comput. Surv., 43(2), article no. 7, April 2011

    Google Scholar 

  24. Chen, Z., Zhang, D., Zhu, R., Ma, Y., Yin, P., Xie, F.: A review of automated formal verification of ad hoc routing protocols for wireless sensor networks. Sens. Lett. 11(5), 752–764 (2013)

    Article  Google Scholar 

  25. Biberstein, O., Buchs, D., Guelfi, N.: Object-oriented nets with algebraic specifications: the CO-OPN/2 formalism. In: Agha, G., De Cindio, F., Rozenberg, G. (eds.) APN 2001. LNCS, vol. 2001, p. 73. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  26. Bouroulet, R., Devillers, R., Klaudel, H., Pelz, E., Pommereau, F.: Modeling and analysis of security protocols using role based specifications and petri nets. In: van Hee, K.M., Valk, R. (eds.) PETRI NETS 2008. LNCS, vol. 5062, pp. 72–91. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  27. Vautherin, J.: Un modèle algébrique, basé sur les réseaux de Petri, pour l’étude des systèmes parallèles, Ph.D. thesis, Université de Paris-Sud, LRI (1985)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mihai Lica Pura .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Pura, M.L., Buchs, D. (2015). Symbolic Model Checking of Security Protocols for Ad hoc Networks on any Topologies. In: Koutny, M., Desel, J., Haddad, S. (eds) Transactions on Petri Nets and Other Models of Concurrency X. Lecture Notes in Computer Science(), vol 9410. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48650-4_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48650-4_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48649-8

  • Online ISBN: 978-3-662-48650-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics