Preprint Article Version 1 This version is not peer-reviewed

Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols

Version 1 : Received: 1 September 2024 / Approved: 2 September 2024 / Online: 3 September 2024 (10:56:53 CEST)

How to cite: Zbrzezny, A. M.; Siedlecka-Lamch, O.; Szymoniak, S.; Zbrzezny, A.; Kurkowski, M. Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols. Preprints 2024, 2024090148. https://doi.org/10.20944/preprints202409.0148.v1 Zbrzezny, A. M.; Siedlecka-Lamch, O.; Szymoniak, S.; Zbrzezny, A.; Kurkowski, M. Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols. Preprints 2024, 2024090148. https://doi.org/10.20944/preprints202409.0148.v1

Abstract

This article introduces a new method for modelling and verifying the execution of timed security protocols (TSP) and their time-dependent security properties. The method, which is both novel and reliable, uses an extension of interpreted systems, accessible semantics in multi-agent systems, and timed interpreted systems (TIS) with dense time semantics to model TSP executions. We enhance the models of TSPs by incorporating delays and varying lifetimes to capture real-life aspects of protocol executions. To illustrate the method, we model a timed version of the Needham-Schroeder Public Key Authentication Protocol. We have also developed a new SMT-based bounded model checking reachability algorithm for the proposed structures and implemented it with the tool. The method comprises a new procedure for modelling TSP executions, a translation of TSP into TIS, and a translation of TIS's reachability problem into the SMT problem. The paper also includes thorough experimental results for nine protocols modelled by TIS and discusses the findings in detail.

Keywords

Timed security protocols; Multi-agent systems; Timed Interpreted Systems; Bounded Model Checking; Satisfiability modulo theories

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.