Abstract
Petri nets have proved their effectiveness in modeling and formal verification of a large number of applications: control systems, communication protocols, application workflows, hardware design, etc. In the present days, one important focus of computer science is on security and secure communications. The use of Petri nets for verifying security properties is not a mature field due to a lack of convenient modeling and verification capabilities. So far, in the Petri Net field there is only CPN Tools that is mature enough for modeling, using the colored Petri nets formalism. Nevertheless such verifications cannot be performed on large systems as CPN Tools is based on an exhaustive way of computing the semantics of a model. In this paper we present the use of AlPiNA, another candidate for this task. AlPiNA is a symbolic model checker that uses the formalism of algebraic Petri nets. We have used it successfully for modeling ad hoc networks and for verifying security protocols designed for this type of networks. As a case study and benchmark we have chosen the ARAN secure routing protocol. We managed to find all the attacks that were already reported for this protocol. To our knowledge this work is also the first successful attempt to use Petri nets for model checking the security properties of ad hoc networks protocols.
This work has been partially supported by the SCIEX SARPOT project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hostettler, S.P.: High-level Petri net model checking: the symbolic way, Ph.D. thesis, University of Geneva (2011)
Permpoontanalarp, Y., Sornkhom, P.: A new colored petri net methodology for the security analysis of cryptographic protocols. In: The 10th Workshop and Tutorial on Practical Use of Colored Petri Nets and the CPN Tools, Denmark, pp. 81–100 (2009)
Buchs, D., Hostettler, S., Marechal, A., Risoldi, M.: AlPiNA: a symbolic model checker. In: Lilius, J., Penczek, W. (eds.) PETRI NETS 2010. LNCS, vol. 6128, pp. 287–296. Springer, Heidelberg (2010)
Hostettler, S.P., Marechal, A., Linard, A., Risoldi, M., Buchs, D.: High-level petri net model checking with AlPiNA. Fundamenta Informaticae, 113(3–4), August 2011, ISSN 0169–2968, 229–264 (2011)
AlPiNA tool web page, 10 March 2015. http://alpina.unige.ch/
Sanzgiri, K., Dahill, B.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols, pp. 78–87 (2002)
Khoukhi, L., Cherkaui, S.: Intelligent solution for congestion control in wireless ad hoc networks. In: WONS 2006: Third Annual Conference on Wireless On-demand Network Systems and Services, pp. 10–19 (2006)
Chiang, T-C., Huang, Z-M.: Multicast routing representation in ad hoc networks using fuzzy petri nets. In: Proceedings of the 18th International Conference on Advanced Information Networking and Application, vol. 2, p. 420 (2004)
Zhang, C., Zhou, M.: A stochastic petri net approach to modeling and analysis of ad hoc network. In: Proceedings of the International Conference on Information Technology: Research and Education, pp. 152–156 (2003)
Beccuti, M., De Pierro, M., Horvath, A., Horvath, A., Farkas, K.: A mean field based methodology for modeling mobility in ad hoc networks. In: IEEE 73rd, Vehicular Technology Conference (VTC Spring), 2011, pp. 1–5 (2011)
Prasad, P., Singh, B., Sahoo, A.K.: Validation of Routing Protocol for Mobile Ad Hoc Networks using Colored Petri Nets, bachelor thesis. National Institute of Technology, Rourkela (2009)
Xiong, C., Murata, T., Tsai, J.: Modeling and simulation of routing protocol for mobile ad hoc networks using colored petri nets. Proc. Conf. Appl. Theory Petri Nets Formal Meth. Software Eng. De-fence Syst. 12, 145–153 (2002)
Jamali, M.A.J., Khosravi, T.: Validation of ad hoc on-demand multipath distance vector using colored petri nets. Int. Conf. Comput. Softw. Model. Singap. 14, 29–34 (2011)
Espensen, K.L., Kjeldsen, M.K., Kristensen, L.M.: Modelling and initial validation of the DYMO routing protocol for mobile ad-hoc networks. In: van Hee, K.M., Valk, R. (eds.) PETRI NETS 2008. LNCS, vol. 5062, pp. 152–170. Springer, Heidelberg (2008)
Permpoontanalarp, Y., Changkhanak, A.: Security Analysis of the TMN protocol by using colored petri nets: on-the-fly trace generation method and homomorphic property In: The 8th International Joint Conference on Computer Science and Software Engineering (JCSSE), pp. 63–68 (2011)
Yang, X.: Modeling and analysis of security protocols using colored petri nets. J. Comput. 6(1), 19–27 (2011)
Golas, U., Hoffman, K., Ehrig, H., Rein, A., Padberg, J.: Functional analysis of algebraic higher-order net systems with applications to mobile ad-hoc networks. Bulletin EATCS 101, 148–160 (2010)
Padberg, J., Ehrig, H., Ribeiro, L.: Formal modeling and analysis of flexible processes in mobile ad-hoc networks. Bulletin EATCS, 128–132 (2007)
Ehrig, H., Mahr, B.: Fundamentals of Algebraic Specification 1: Equations and Initial Semantics. Monographs in Theoretical Computer Science, An EATCS Series. Springer, Heidelberg (1985)
Ayar, A., Marin, M.: Unifying the syntax and semantics of modular extensions of Petri nets, Ph.D. thesis, University of Geneva (2013)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)
Benetti, D., Merro, M., Vigano, L.: Model checking ad hoc network routing protocols: ARAN vs. endairA. In: The 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM), pp. 191–202 (2010)
Viana, A.C., Maag, S., Zaidi, F.: One step forward: linking wireless self-organising networks validation techniques with formal testing approaches, ACM Comput. Surv., 43(2), article no. 7, April 2011
Chen, Z., Zhang, D., Zhu, R., Ma, Y., Yin, P., Xie, F.: A review of automated formal verification of ad hoc routing protocols for wireless sensor networks. Sens. Lett. 11(5), 752–764 (2013)
Biberstein, O., Buchs, D., Guelfi, N.: Object-oriented nets with algebraic specifications: the CO-OPN/2 formalism. In: Agha, G., De Cindio, F., Rozenberg, G. (eds.) APN 2001. LNCS, vol. 2001, p. 73. Springer, Heidelberg (2001)
Bouroulet, R., Devillers, R., Klaudel, H., Pelz, E., Pommereau, F.: Modeling and analysis of security protocols using role based specifications and petri nets. In: van Hee, K.M., Valk, R. (eds.) PETRI NETS 2008. LNCS, vol. 5062, pp. 72–91. Springer, Heidelberg (2008)
Vautherin, J.: Un modèle algébrique, basé sur les réseaux de Petri, pour l’étude des systèmes parallèles, Ph.D. thesis, Université de Paris-Sud, LRI (1985)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Pura, M.L., Buchs, D. (2015). Symbolic Model Checking of Security Protocols for Ad hoc Networks on any Topologies. In: Koutny, M., Desel, J., Haddad, S. (eds) Transactions on Petri Nets and Other Models of Concurrency X. Lecture Notes in Computer Science(), vol 9410. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48650-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-662-48650-4_6
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-48649-8
Online ISBN: 978-3-662-48650-4
eBook Packages: Computer ScienceComputer Science (R0)