On the Use of Automatic Tools for the Formal Analysis of the IEEE 802.11 Key-Exchange Protocols (Contributo in atti di convegno)

Type
Label
  • On the Use of Automatic Tools for the Formal Analysis of the IEEE 802.11 Key-Exchange Protocols (Contributo in atti di convegno) (literal)
Anno
  • 2006-01-01T00:00:00+01:00 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
  • 10.1109/WFCS.2006.1704167 (literal)
Alternative label
  • M. Cheminod; I. Cibrario Bertolotti; L. Durante; R. Sisto; A. Valenzano (2006)
    On the Use of Automatic Tools for the Formal Analysis of the IEEE 802.11 Key-Exchange Protocols
    in 6th IEEE International Workshop on Factory Communication Systems (WFCS 2006), Torino, 28-30 Giugno 2006
    (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
  • M. Cheminod; I. Cibrario Bertolotti; L. Durante; R. Sisto; A. Valenzano (literal)
Pagina inizio
  • 273 (literal)
Pagina fine
  • 282 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
  • http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1704167 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
  • IEEE Press, June 2006, pp. 273-282 (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
  • 10 (literal)
Note
  • Scopu (literal)
  • IEEE Xplore digital library (literal)
  • Google Scholar (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
  • M. Cheminod; I. Cibrario Bertolotti; L. Durante; A. Valenzano: CNR-IEIIT, Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni, Torino, Italy R. Sisto: CNR-IEIIT e Dipartimento di Automatica e Informatica, Politecnico di Torino, Torino, Italy (literal)
Titolo
  • On the Use of Automatic Tools for the Formal Analysis of the IEEE 802.11 Key-Exchange Protocols (literal)
Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
  • 1-4244-0379-0 (literal)
Abstract
  • It is well known that the design and development of complex distributed systems, such as those used in modern factory automation and process control environments, can obtain significant benefits from the adoption of formal methods during the specification and verification phases. The importance of using formal techniques for verifying the design correctness is even more evident when aspects such as security and safety are considered and a class of protocols, known as \"cryptographic\" protocols, is taken into account. Cryptographic protocols, in fact, are becoming more and more used in industrial networks to support security-related services such as cryptographic keys exchange/distribution and authentication, due to the ever increasing use of internet/intranet-based connections and the introduction of wireless communications. This paper reports on some experimental investigations on the formal verification of two cryptographic protocols, that are commonly used in industrial wireless 802.11 networks. Investigations are carried out by means of fully automatic and publicly available tools that are based on state-exploration techniques. The aim of our work is twofold: first we intend to offer a contribution in understanding whether or not the current prototype tools can be considered mature enough for helping the designer with the analysis of real protocols, and second we wish to develop some (preliminary) considerations on their characteristics and performance. (literal)
Editore
Prodotto di
Autore CNR
Insieme di parole chiave

Incoming links:


Prodotto
Autore CNR di
Editore di
Insieme di parole chiave di
data.CNR.it