Formal modeling and verification of DLK protocol

H. M.N. Al-Hamadi, C. Y. Yeun, M. J. Zemerly, M. A. Al-Qutayri, Amjad Gawanmeh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

This paper presents a formal model for the analysis and verification of a multi-agent system based on the Distributed Lightweight Kerberos (DLK) protocol. Verifying the security protocol exposes security defects and aids in fixing them. The verification process of the DLK protocol uses the ProVerif tool. Based on this tool, the security mechanism of the protocol is clearly exposed. The results of using ProVerif indicate that DLK is secure as initially claimed.

Original languageBritish English
Title of host publication2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011
Pages578-583
Number of pages6
StatePublished - 2011
Event2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011 - Abu Dhabi, United Arab Emirates
Duration: 11 Dec 201114 Dec 2011

Publication series

Name2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011

Conference

Conference2011 International Conference for Internet Technology and Secured Transactions, ICITST 2011
Country/TerritoryUnited Arab Emirates
CityAbu Dhabi
Period11/12/1114/12/11

Keywords

  • Agent technology
  • DLK protocol
  • Formal Method
  • ProVerif

Fingerprint

Dive into the research topics of 'Formal modeling and verification of DLK protocol'. Together they form a unique fingerprint.

Cite this