http://www.cnr.it/ontology/cnr/individuo/prodotto/ID79404
On the Use of Automatic Tools for the Formal Analysis of the IEEE 802.11 Key-Exchange Protocols (Contributo in atti di convegno)
- Type
- Label
- On the Use of Automatic Tools for the Formal Analysis of the IEEE 802.11 Key-Exchange Protocols (Contributo in atti di convegno) (literal)
- Anno
- 2006-01-01T00:00:00+01:00 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#doi
- 10.1109/WFCS.2006.1704167 (literal)
- Alternative label
M. Cheminod; I. Cibrario Bertolotti; L. Durante; R. Sisto; A. Valenzano (2006)
On the Use of Automatic Tools for the Formal Analysis of the IEEE 802.11 Key-Exchange Protocols
in 6th IEEE International Workshop on Factory Communication Systems (WFCS 2006), Torino, 28-30 Giugno 2006
(literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#autori
- M. Cheminod; I. Cibrario Bertolotti; L. Durante; R. Sisto; A. Valenzano (literal)
- Pagina inizio
- Pagina fine
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#url
- http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1704167 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#note
- IEEE Press, June 2006, pp. 273-282 (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#pagineTotali
- Note
- Scopu (literal)
- IEEE Xplore digital library (literal)
- Google Scholar (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#affiliazioni
- M. Cheminod; I. Cibrario Bertolotti; L. Durante; A. Valenzano: CNR-IEIIT, Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni, Torino, Italy
R. Sisto: CNR-IEIIT e Dipartimento di Automatica e Informatica, Politecnico di Torino, Torino, Italy (literal)
- Titolo
- On the Use of Automatic Tools for the Formal Analysis of the IEEE 802.11 Key-Exchange Protocols (literal)
- Http://www.cnr.it/ontology/cnr/pubblicazioni.owl#isbn
- Abstract
- It is well known that the design and development of
complex distributed systems, such as those used in modern
factory automation and process control environments,
can obtain significant benefits from the adoption of formal
methods during the specification and verification phases.
The importance of using formal techniques for verifying
the design correctness is even more evident when aspects
such as security and safety are considered and a class of
protocols, known as \"cryptographic\" protocols, is taken
into account. Cryptographic protocols, in fact, are becoming
more and more used in industrial networks to support
security-related services such as cryptographic keys
exchange/distribution and authentication, due to the ever
increasing use of internet/intranet-based connections and
the introduction of wireless communications.
This paper reports on some experimental investigations
on the formal verification of two cryptographic protocols,
that are commonly used in industrial wireless 802.11 networks.
Investigations are carried out by means of fully
automatic and publicly available tools that are based on
state-exploration techniques. The aim of our work is
twofold: first we intend to offer a contribution in understanding
whether or not the current prototype tools can be
considered mature enough for helping the designer with
the analysis of real protocols, and second we wish to develop
some (preliminary) considerations on their characteristics
and performance. (literal)
- Editore
- Prodotto di
- Autore CNR
- Insieme di parole chiave
Incoming links:
- Prodotto
- Autore CNR di
- Editore di
- Insieme di parole chiave di