Rule-based assumptions derivation of authentication protocols

Zarina Shukur, Mohd Nazri Ramli

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Authentication protocol can be formally specified by using BAN logic. By using formal specification, we can analyse the protocol mathematically. Before the analysis can be done, we need to have some assumptions. If inadequate assumptions are used, the analysis might at a complete loss, and if we over assume, the analysis might not needed anymore. This paper presents preliminary result of our investigation on developing rules to derive assumptions from an authentication protocol written in BAN logic.

Original languageEnglish
Title of host publicationProceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009
Pages42-45
Number of pages4
Volume1
DOIs
Publication statusPublished - 2009
Event2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009 - Selangor
Duration: 5 Aug 20097 Aug 2009

Other

Other2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009
CitySelangor
Period5/8/097/8/09

Fingerprint

Authentication
Network protocols
Formal specification

Keywords

  • Authentication protocol
  • Rule-based

ASJC Scopus subject areas

  • Information Systems
  • Software
  • Energy Engineering and Power Technology
  • Electrical and Electronic Engineering

Cite this

Shukur, Z., & Ramli, M. N. (2009). Rule-based assumptions derivation of authentication protocols. In Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009 (Vol. 1, pp. 42-45). [5254820] https://doi.org/10.1109/ICEEI.2009.5254820

Rule-based assumptions derivation of authentication protocols. / Shukur, Zarina; Ramli, Mohd Nazri.

Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009. Vol. 1 2009. p. 42-45 5254820.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Shukur, Z & Ramli, MN 2009, Rule-based assumptions derivation of authentication protocols. in Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009. vol. 1, 5254820, pp. 42-45, 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009, Selangor, 5/8/09. https://doi.org/10.1109/ICEEI.2009.5254820
Shukur Z, Ramli MN. Rule-based assumptions derivation of authentication protocols. In Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009. Vol. 1. 2009. p. 42-45. 5254820 https://doi.org/10.1109/ICEEI.2009.5254820
Shukur, Zarina ; Ramli, Mohd Nazri. / Rule-based assumptions derivation of authentication protocols. Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009. Vol. 1 2009. pp. 42-45
@inproceedings{3f483e1320e54362b10369ea2370acf1,
title = "Rule-based assumptions derivation of authentication protocols",
abstract = "Authentication protocol can be formally specified by using BAN logic. By using formal specification, we can analyse the protocol mathematically. Before the analysis can be done, we need to have some assumptions. If inadequate assumptions are used, the analysis might at a complete loss, and if we over assume, the analysis might not needed anymore. This paper presents preliminary result of our investigation on developing rules to derive assumptions from an authentication protocol written in BAN logic.",
keywords = "Authentication protocol, Rule-based",
author = "Zarina Shukur and Ramli, {Mohd Nazri}",
year = "2009",
doi = "10.1109/ICEEI.2009.5254820",
language = "English",
isbn = "9781424449132",
volume = "1",
pages = "42--45",
booktitle = "Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009",

}

TY - GEN

T1 - Rule-based assumptions derivation of authentication protocols

AU - Shukur, Zarina

AU - Ramli, Mohd Nazri

PY - 2009

Y1 - 2009

N2 - Authentication protocol can be formally specified by using BAN logic. By using formal specification, we can analyse the protocol mathematically. Before the analysis can be done, we need to have some assumptions. If inadequate assumptions are used, the analysis might at a complete loss, and if we over assume, the analysis might not needed anymore. This paper presents preliminary result of our investigation on developing rules to derive assumptions from an authentication protocol written in BAN logic.

AB - Authentication protocol can be formally specified by using BAN logic. By using formal specification, we can analyse the protocol mathematically. Before the analysis can be done, we need to have some assumptions. If inadequate assumptions are used, the analysis might at a complete loss, and if we over assume, the analysis might not needed anymore. This paper presents preliminary result of our investigation on developing rules to derive assumptions from an authentication protocol written in BAN logic.

KW - Authentication protocol

KW - Rule-based

UR - http://www.scopus.com/inward/record.url?scp=70449623391&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70449623391&partnerID=8YFLogxK

U2 - 10.1109/ICEEI.2009.5254820

DO - 10.1109/ICEEI.2009.5254820

M3 - Conference contribution

AN - SCOPUS:70449623391

SN - 9781424449132

VL - 1

SP - 42

EP - 45

BT - Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009

ER -