This paper presents some remarks on the analysis of security protocols taking into account their time properties. Usually untimed or timed protocols are investigated with security properties, such as the secrecy of some data or the allowance of mutual authentication. These properties are independent of time. In this paper we investigate different executions, sometimes executed simultaneously, of a protocol and different types of times: ciphering and deciphering time, step execution time, whole protocol execution time, and delays in the network. Taking this into account we can investigate how these times can be chosen regardless of the possibility of an attack execution. As part of the work we have implemented a tool that helps us in the mentioned work and allows to present some experimental results.
CITATION STYLE
Szymoniak, S., Siedlecka-Lamch, O., & Kurkowski, M. (2017). Timed analysis of security protocols. Advances in Intelligent Systems and Computing, 522, 53–63. https://doi.org/10.1007/978-3-319-46586-9_5
Mendeley helps you to discover research relevant for your work.