Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols
Abstract
:1. Introduction
- Modelling TSP executions as timed interpreted systems with real-time, in which each agent (user) taking part in the protocol is modelled as a network of timed, synchronised automata—it is a more realistic solution compared with the previous ones;
- Expressing times of actions performed during the protocol’s execution and the network delays (which include message generation times, encryption, decryption, and network transfer times)—using these, we can compute dependencies between these values and lifetimes of TSPs’ time primitives (time tickets), which is essential when considering the possibility of an attack;
- The ability to detect and prevent the existence in the network of a passive Intruder in Man-in-the-Middle configurations;
- Considering a strongly monotonic version of dense timed semantics and many different lifetimes and their values;
- New, suitable implementation and experimental results.
2. Related Work
3. Timed Interpreted Systems
3.1. The Intuition Behind Interpreted Systems, Interleaved Interpreted Systems and a Network of Timed Automata
3.2. TIS Formalism
4. Modelling of TSP Executions
- α1
- α2
- α3
- ,
- (Intruder as an ordinary user),
- (Intruder impersonating B),
- ,
- ,
- (Intruder impersonating A),
- ,
- ,
- ,
- ,
TIS for NSPKT Executions Modelling
- ,
- ,
- .
- ,
- ,
- ,
- ,
- ,
- ,
- .
- ,
- ,
- ,
- ;
- the second execution:
- ,
- ,
- ,
- ,
- ;
- and the resetting automaton:
- .
- For the agents, we define the local evolution functions for the :
- ,
- ,
- ,
- ,
- ;
- and for the ticket :
- ,
- ,
- .
- The intruder-specific automaton for a complete message can be described by the following functions:
- ,
- ;
- and all the blocking automata:
- ,
5. Reachability Checking
5.1. Timed Model
5.2. Reachability Analysis
Algorithm 1 The standard bounded model checking algorithm for testing reachability |
|
- refined the definitions for the encoding of the transition relation (as the definition in the cited paper lacked precision), and
- incorporated real-time aspects of multi-agent systems, whereas the previous SMT encoding was limited to discrete time.
- encodes the state s of the model ,
- encodes an action transition and ensures that every local action in is performed by each agent in which this action appears,
- encodes a time transition in .
6. Experimental Results
6.1. Implementation
6.2. SMT-Solvers
6.3. Performance Evaluation
6.3.1. Andrew Protocol
6.3.2. Lowe’s Modification of Andrew Protocol
6.3.3. Denning–Sacco Protocol
6.3.4. Needham–Schroeder Public Key Protocol
6.3.5. Lowe’s Modification of Needham–Schroeder Public Key Protocol
6.3.6. Woo Lam Pi Protocol
6.3.7. Woo Lam Pi 1, 2 and 3
6.3.8. MobInfoSec Protocol
6.4. Conclusions on Performance Evaluation
7. Future Work
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Lowe, G. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In Tools and Algorithms for the Construction and Analysis of Systems: Second International Workshop, TACAS ’96, Passau, Germany, 27–29 March 1996, Proceedings; Springer: Berlin/Heidelberg, Germany, 1996; pp. 147–166. [Google Scholar]
- Burrows, M.; Abadi, M.; Needham, R. A Logic of Authentication. ACM Trans. Comput. Syst. 1990, 8, 18–36. [Google Scholar] [CrossRef]
- Dojen, R.; Jurcut, A.; Coffey, T.; Gyorodi, C. On Establishing and Fixing a Parallel Session Attack in a Security Protocol. In Intelligent Distributed Computing, Systems and Applications: Proceedings of the 2nd International Symposium on Intelligent Distributed Computing (IDC 2008), Catania, Italy, 18–19 September 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 239–244. [Google Scholar] [CrossRef]
- Woźna-Szcześniak, B.; Zbrzezny, A. Checking EMTLK Properties of Timed Interpreted Systems via Bounded Model Checking. Stud. Log. 2015, 104, 641–678. [Google Scholar] [CrossRef]
- Boureanu, I.; Cohen, M.; Lomuscio, A. Automatic verification of temporal-epistemic properties of cryptographic protocols. J. Appl. Non Class. Logics 2009, 19, 463–487. [Google Scholar] [CrossRef]
- Leustean, I.; Macovei, B. DELP: Dynamic Epistemic Logic for Security Protocols. In Proceedings of the 23rd International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2021, Timisoara, Romania, 7–10 December 2021; pp. 275–282. [Google Scholar] [CrossRef]
- Kurkowski, M.; Penczek, W. Applying Timed Automata to Model Checking of Security Protocols. In Handbook of Finite State Based Models and Applications; CRC Press: Boca Raton, FL, USA; Taylor & Francis Group: Abingdon, UK, 2016; pp. 223–254. [Google Scholar] [CrossRef]
- Backes, M.; Dreier, J.; Kremer, S.; Künnemann, R. A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroS&P), Paris, France, 26–28 April 2017; pp. 76–91. [Google Scholar] [CrossRef]
- Dolev, D.; Halpern, J.Y.; Simons, B.; Strong, H.R. Dynamic Fault-Tolerant Clock Synchronization. J. ACM 1995, 42, 143–185. [Google Scholar] [CrossRef]
- Alur, R.; Dill, D.L. A Theory of Timed Automata. Theor. Comput. Sci. 1994, 126, 183–235. [Google Scholar] [CrossRef]
- Halpern, J.Y.; van der Meyden, R.; Pucella, R. An Epistemic Foundation for Authentication Logics (Extended Abstract). In Proceedings of the 16 Conference on Theoretical Aspects of Rationality and Knowledge (TARK 2017), Liverpool, UK, 24–26 July 2017; pp. 306–323. [Google Scholar] [CrossRef]
- Lomuscio, A.; Penczek, W.; Qu, H. Partial Order Reductions for Model Checking Temporal-epistemic Logics over Interleaved Multi-agent Systems. Fundam. Inform. 2010, 101, 71–90. [Google Scholar] [CrossRef]
- Scellato, S.; Leontiadis, I.; Mascolo, C.; Basu, P.; Zafer, M. Evaluating Temporal Robustness of Mobile Networks. IEEE Trans. Mob. Comput. 2013, 12, 105–117. [Google Scholar] [CrossRef]
- Cheval, V.; Cortier, V. Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques. Verification of Security Protocols. In Proceedings of the Principles of Security and Trust—4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, 11–18 April 2015; pp. 280–299. [Google Scholar]
- Jakubowska, G.; Dembinski, P.; Penczek, W.; Szreter, M. Simulation of Security Protocols based on Scenarios of Attacks. Fundam. Inform. 2009, 93, 185–203. [Google Scholar] [CrossRef]
- Kanovich, M.; Kirigin, T.; Nigam, V.; Scedrov, A.; Talcott, C. Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols. In Principles of Security and Trust: 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, 11–18 April 2015, Proceedings; Springer: Berlin/Heidelberg, Germany, 2015; Volume 9036, pp. 259–279. [Google Scholar]
- Basin, D.A.; Cremers, C.; Meadows, C.A. Model Checking Security Protocols. In Handbook of Model Checking; Springer: Cham, Switzerland, 2018; pp. 727–762. [Google Scholar]
- Biere, A.; Cimatti, A.; Clarke, E.M.; Fujita, M.; Zhu, Y. Symbolic Model Checking Using SAT Procedures instead of BDDs. In Proceedings of the 36th Conference on Design Automation, New Orleans, LA, USA, 21–25 June 1999; pp. 317–320. [Google Scholar]
- Lomuscio, A.; Raimondi, F.; Wozna, B. Verification of the TESLA protocol in MCMAS-X. Fundam. Inform. 2007, 79, 473–486. [Google Scholar]
- Basin, D.A.; Cremers, C.; Dreier, J.; Sasse, R. Symbolically analyzing security protocols using tamarin. ACM SIGLOG News 2017, 4, 19–30. [Google Scholar] [CrossRef]
- Hess, A.V.; Mödersheim, S. Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL. In Proceedings of the 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, 21–25 August 2017; pp. 451–463. [Google Scholar] [CrossRef]
- Mödersheim, S.; Viganò, L.; Basin, D.A. Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. J. Comput. Secur. 2010, 18, 575–618. [Google Scholar] [CrossRef]
- Armando, A.; Carbone, R.; Compagna, L. SATMC: A SAT-based model checker for security protocols, business processes, and security APIs. Int. J. Softw. Tools Technol. Transf. 2016, 18, 187–204. [Google Scholar] [CrossRef]
- Li, L.; Sun, J.; Liu, Y.; Sun, M.; Dong, J. A Formal Specification and Verification Framework for Timed Security Protocols. IEEE Trans. Softw. Eng. 2018, 44, 725–746. [Google Scholar] [CrossRef]
- Benerecetti, M.; Cuomo, N.; Peron, A. TPMC: A Model Checker For Time–Sensitive Security Protocols. J. Comput. 2009, 4, 366–377. [Google Scholar] [CrossRef]
- Zbrzezny, A.M.; Zbrzezny, A.; Siedlecka-Lamch, O.; Szymoniak, S.; Kurkowski, M. VerSecTis—An agent based model checker for security protocols. In Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2020), Auckland, New Zealand, 9–13 May 2020; pp. 2123–2125. [Google Scholar]
- Lomuscio, A.; Penczek, W. LDYIS: A Framework for Model Checking Security Protocols. Fundam. Inform. 2008, 85, 359–375. [Google Scholar]
- Boureanu, I.; Cohen, M.; Lomuscio, A. Model checking detectability of attacks in multiagent systems. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), Toronto, ON, Canada, 10–14 May 2010; Volume 1–3, pp. 691–698. [Google Scholar]
- Boureanu, I.; Jones, A.V.; Lomuscio, A. Automatic verification of epistemic specifications under convergent equational theories. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS ’12), Valencia, Spain, 4–8 June 2012; pp. 1141–1148. [Google Scholar]
- Millen, J.K. CAPSL: Common Authentication Protocol Specification Language. In Proceedings of the 1996 Workshop on New Security Paradigms, Lake Arrowhead, CA, USA, 17–20 September 1996; p. 132. [Google Scholar]
- Boureanu, I.; Kouvaros, P.; Lomuscio, A. Verifying Security Properties in Unbounded Multiagent Systems. In Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems (AAMAS ’16), Singapore, 9–13 May 2016; pp. 1209–1217. [Google Scholar]
- Corin, R.; Etalle, S.; Hartel, P.H.; Mader, A. Timed analysis of security protocols. J. Comput. Secur. 2007, 15, 619–645. [Google Scholar] [CrossRef]
- Jakubowska, G.; Penczek, W. Modelling and Checking Timed Authentication of Security Protocols. Fundam. Inform. 2007, 79, 363–378. [Google Scholar]
- Zbrzezny, A.M.; Szymoniak, S.; Kurkowski, M. Efficient Verification of Security Protocols Time Properties Using SMT Solvers. In Proceedings of the International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), Seville, Spain, 13–15 May 2019; Proceedings. Springer: Cham, Switzerland, 2019; pp. 25–35. [Google Scholar] [CrossRef]
- Li, L.; Sun, J.; Dong, J.S. Automated Verification of Timed Security Protocols with Clock Drift. In FM 2016: Formal Methods: 21st International Symposium, Limassol, Cyprus, 9–11 November 2016, Proceedings; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2016; Volume 9995, pp. 513–530. [Google Scholar] [CrossRef]
- Mu, Y.; Juan, L.; Shen, G.; Zihao, W. Runtime verification of self-adaptive multi-agent system using probabilistic timed automata. J. Intell. Fuzzy Syst. 2023, 45, 10305–10322. [Google Scholar] [CrossRef]
- Sankur, O. Timed Automata Verification and Synthesis via Finite Automata Learning. In Tools and Algorithms for the Construction and Analysis of Systems: 29th International Conference, TACAS 2023, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2023, Paris, France, 22–27 April 2023, Proceedings, Part II; Springer: Cham, Switzerland, 2023; pp. 335–349. [Google Scholar] [CrossRef]
- Barthe, G.; Lago, U.D.; Malavolta, G.; Rakotonirina, I. Tidy: Symbolic Verification of Timed Cryptographic Protocols. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA, 7–11 November 2022. [Google Scholar] [CrossRef]
- Middelburg, C. Dormancy-aware timed branching bisimilarity with an application to communication protocol analysis. Theor. Comput. Sci. 2024, 912, 114681. [Google Scholar] [CrossRef]
- Sahu, P. Automated Verification for Real-Time Systems. In Tools and Algorithms for the Construction and Analysis of Systems: 29th International Conference, TACAS 2023, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2023, Paris, France, 22–27 April 2023, Proceedings, Part I; Springer: Cham, Switzerland, 2023; pp. 569–587. [Google Scholar] [CrossRef]
- Fagin, R.; Halpern, J.Y.; Moses, Y.; Vardi, M.Y. Reasoning About Knowledge; MIT Press: Cambridge, UK, 1995. [Google Scholar]
- Wooldridge, M. An Introduction to Multi-Agent Systems, 2nd ed.; John Wiley & Sons: Hoboken, NJ, USA, 2009. [Google Scholar]
- Lomuscio, A.; Sergot, M.J. Deontic Interpreted Systems. Stud. Log. 2003, 75, 63–92. [Google Scholar] [CrossRef]
- Woźna-Szcześniak, B. SAT-Based Bounded Model Checking for Weighted Deontic Interpreted Systems. In Progress in Artificial Intelligence: 16th Portuguese Conference on Artificial Intelligence, EPIA 2013, Angra do Heroísmo, Azores, Portugal, 9–12 September 2013, Proceedings; Springer: Berlin/Heidelberg, Germany, 2013; pp. 444–455. [Google Scholar]
- Meski, A.; Penczek, W.; Szreter, M.; Wozna-Szczesniak, B.; Zbrzezny, A. BDD-versus SAT-based bounded model checking for the existential fragment of linear temporal logic with knowledge: Algorithms and their performance. Auton. Agents Multi Agent Syst. 2014, 28, 558–604. [Google Scholar] [CrossRef]
- Needham, R.; Schroeder, M. Using Encryption for Authentication in Large Networks of Computers. Commun. ACM 1978, 21, 993–999. [Google Scholar] [CrossRef]
- Lowe, G. An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Inf. Process. Lett. 1995, 56, 131–133. [Google Scholar] [CrossRef]
- Baier, C.; Katoen, J.P. Principles of Model Checking; MIT Press: Cambridge, UK, 2008; pp. I–XVII, 1–975. [Google Scholar]
- Zbrzezny, A.M.; Zbrzezny, A. Checking WECTLK Properties of Timed Real-Weighted Interpreted Systems via SMT-based Bounded Model Checking. In Progress in Artificial Intelligence: 17th Portuguese Conference on Artificial Intelligence, EPIA 2015, Coimbra, Portugal, 8–11 September 2015, Proceedings; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2015; Volume 9273, pp. 638–650. [Google Scholar]
- Moura, L.D.; Bjørner, N. Z3: An Efficient SMT solver. In Tools and Algorithms for the Construction and Analysis of Systems: 14th International Conference, TACAS 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, 29 March–6 April 2008, Proceedings; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2008; Volume 4963, pp. 337–340. [Google Scholar]
- Dutertre, B. Yices 2.2. In Computer Aided Verification: 26th International Conference, CAV 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, 18–22 July 2014, Proceedings; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2014; Volume 8559, pp. 737–744. [Google Scholar]
- Barrett, C.; Conway, C.L.; Deters, M.; Hadarean, L.; Jovanovi’c, D.; King, T.; Reynolds, A.; Tinelli, C. CVC4. In Computer Aided Verification: 23rd International Conference, CAV 2011, Snowbird, UT, USA, 14–20 July 2011, Proceedings; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2011; Volume 6806, pp. 171–177. [Google Scholar]
- Callegati, F.; Cerroni, W.; Ramilli, M. Man-in-the-Middle Attack to the HTTPS Protocol. IEEE Secur. Priv. Mag. 2009, 7, 78–81. [Google Scholar] [CrossRef]
- Denning, D.E.; Sacco, G.M. Timestamps in Key Distribution Protocols. Commun. ACM 1981, 24, 533–536. [Google Scholar] [CrossRef]
- Woo, T.Y.C.; Lam, S.S. A Lesson on Authentication Protocol Design. SIGOPS Oper. Syst. Rev. 1994, 28, 24–37. [Google Scholar] [CrossRef]
- Satyanarayanan, M. Integrating security in a large distributed system. ACM Trans. Comput. Syst. 1989, 7, 247–280. [Google Scholar] [CrossRef]
- Lowe, G. Some new attacks upon security protocols. In Proceedings of the 9th IEEE Computer Security Foundations Workshop, Kenmare, Ireland, 10–12 June 1996; pp. 162–169. [Google Scholar]
- Siedlecka-Lamch, O.; El Fray, I.; Kurkowski, M.; Pejas, J. Verification of Mutual Authentication Protocol for MobInfoSec System. In Computer Information Systems and Industrial Management: Proceedings of the 14th IFIP TC 8 International Conference, CISIM 2015, Warsaw, Poland, 24–26 September 2015; Springer: Cham, Switzerland, 2015; pp. 461–474. [Google Scholar]
- Zbrzezny, A.M. A comparison of SMT-solvers for timed weighted interpreted systems. Sci. Issues Jan DłUgosz Univ. CzęStochowa Math. 2016, 21, 189–206. [Google Scholar] [CrossRef]
- Abadi, M.; Blanchet, B.; Fournet, C. The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication. J. ACM 2017, 65. [Google Scholar] [CrossRef]
- Knapik, M.; Penczek, W. SMT-Based Parameter Synthesis for Parametric Timed Automata. In Challenging Problems and Solutions in Intelligent Systems; Studies in Computational Intelligence; Tré, G.D., Grzegorzewski, P., Kacprzyk, J., Owsinski, J.W., Penczek, W., Zadrozny, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2016; Volume 634, pp. 3–21. [Google Scholar] [CrossRef]
- André, É.; Knapik, M.; Penczek, W.; Petrucci, L. Controlling Actions and Time in Parametric Timed Automata. In Proceedings of the 16th International Conference on Application of Concurrency to System Design, ACSD 2016, Torun, Poland, 19–24 June 2016; IEEE Computer Society: Piscataway, NJ, USA, 2016; pp. 45–54. [Google Scholar] [CrossRef]
Protocol | Advantages | Disadvantages |
---|---|---|
NSPKT [46] |
|
|
NSPKTL [1] |
|
|
DS [54] |
|
|
WLP [34,55] |
|
|
WLP 1 & 3 [55] |
|
|
AP [56] |
|
|
ALP [57] |
|
|
MIS [58] |
|
|
Protocol | BMC | SMT | Type of the Attack | ||
---|---|---|---|---|---|
[s] | [MB] | [s] | [MB] | ||
NSPKT | 0.48 | 2.43 | 0.90 | 24.28 | MitM |
NSPKT | 0.49 | 1.61 | 2.40 | 30.80 | Lowe’s attack |
NSPKTL | 0.49 | 2.43 | 2.38 | 26.11 | MitM |
Denning-Sacco Protocol | 0.28 | 2.57 | 0.40 | 23.38 | MitM |
Woo Lam Pi Protocol | 0.40 | 2.54 | 0.70 | 29.11 | MitM |
Woo Lam Pi Protocol 1 | 0.54 | 2.61 | 1.26 | 32.54 | MitM |
Woo Lam Pi Protocol 3 | 0.54 | 2.61 | 1.44 | 32.19 | MitM |
Andrew Protocol | 1.80 | 2.69 | 12.90 | 48.93 | MitM 1 |
AndrewL Protocol | 0.98 | 2.75 | 3.15 | 40.44 | MitM |
MobInfoSec | 40.67 | 16.49 | 199.01 | 384.17 | MitM |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zbrzezny, A.M.; Siedlecka-Lamch, O.; Szymoniak, S.; Zbrzezny, A.; Kurkowski, M. Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols. Appl. Sci. 2024, 14, 10333. https://doi.org/10.3390/app142210333
Zbrzezny AM, Siedlecka-Lamch O, Szymoniak S, Zbrzezny A, Kurkowski M. Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols. Applied Sciences. 2024; 14(22):10333. https://doi.org/10.3390/app142210333
Chicago/Turabian StyleZbrzezny, Agnieszka M., Olga Siedlecka-Lamch, Sabina Szymoniak, Andrzej Zbrzezny, and Mirosław Kurkowski. 2024. "Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols" Applied Sciences 14, no. 22: 10333. https://doi.org/10.3390/app142210333
APA StyleZbrzezny, A. M., Siedlecka-Lamch, O., Szymoniak, S., Zbrzezny, A., & Kurkowski, M. (2024). Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols. Applied Sciences, 14(22), 10333. https://doi.org/10.3390/app142210333