scholarly journals Formal Methods in Information Security

2015 ◽  
Vol 14 (4) ◽  
pp. 5621-5631
Author(s):  
AJAYI ADEBOWALE ◽  
NICULAE GOGA ◽  
OTUSILE OLUWABUKOLA ◽  
ABEL SAMUEL

Formal methods use mathematical models for analysis and verification at any part of the program life-cycle. The use of formal methods is admitted, recommended, and sometimes prescribed in safety-and security-related standards dealing, e.g., with avionics, railways, nuclear energy, and secure information systems. This paper describes the state of the art in the industrial use of formal methods ininformation security with a focus on verification of security protocols. Given the vast scope of available solutions, attention has been focused just on the most popular and most representative ones, without exhaustiveness claims. We describe some of the highlights of our survey by presenting a series of industrial projects, and we draw some observations from these surveys and records of experience. Based on this, we discuss issues surrounding the industrial adoption of formal methods in security protocol engineering.

Author(s):  
Alfredo Pironti ◽  
Davide Pozza ◽  
Riccardo Sisto

Designing and implementing security protocols are known to be error-prone tasks. Recent research progress in the field of formal methods applied to security protocols has enabled the use of these techniques in practice. The objective of this chapter is to give a circumstantial account of the state-of-the-art reached in this field, showing how formal methods can help in improving quality. Since automation is a key factor for the acceptability of these techniques in the engineering practice, the chapter focuses on automated techniques and illustrates in particular how high-level protocol models in the Dolev-Yao style can be automatically analyzed and how it is possible to automatically enforce formal correspondence between an abstract high-level model and an implementation.


2003 ◽  
Vol 10 (10) ◽  
Author(s):  
Federico Crazzolara ◽  
Giuseppe Milicia

The chi-Spaces framework provides a set of tools to support every step of the security protocol's life-cycle. The framework includes a simple, yet powerful programming language which is an implementation of the Security Protocol Language (SPL). SPL is a formal calculus designed to model security protocols and prove interesting properties about them. In this paper we take an authentication protocol suited for low-power wireless devices and derive a chi-Spaces implementation from its SPL model. We study the correctness of the resulting implementation using the underlying SPL semantics of chi-Spaces.


Author(s):  
Tom Coffey

This chapter concerns the correct and reliable design of modern security protocols. It discusses the importance of formal verification of security protocols prior to their release by publication or implementation. A discussion on logic-based verification of security protocols and its automation provides the reader with an overview of the current state-of-the-art of formal verification of security protocols. The authors propose a formal verification centred development process for security protocols. This process provides strong confidence in the correctness and reliability of the designed protocols. Thus, the usage of weak security protocols in communication systems is prevented. A case-study on the development of a security protocol demonstrates the advantages of the proposed approach. The case-study concludes with remarks on the performance of automated logic-based verification and presents an overview of formal verification results of a range of modern security protocols.


2021 ◽  
Vol 13 (5) ◽  
pp. 2472
Author(s):  
Teodora Stillitano ◽  
Emanuele Spada ◽  
Nathalie Iofrida ◽  
Giacomo Falcone ◽  
Anna Irene De Luca

This study aims at providing a systematic and critical review on the state of the art of life cycle applications from the circular economy point of view. In particular, the main objective is to understand how researchers adopt life cycle approaches for the measurement of the empirical circular pathways of agri-food systems along with the overall lifespan. To perform the literature review, the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) protocol was considered to conduct a review by qualitative synthesis. Specifically, an evaluation matrix has been set up to gather and synthesize research evidence, by classifying papers according to several integrated criteria. The literature search was carried out employing scientific databases. The findings highlight that 52 case studies out of 84 (62% of the total) use stand-alone life cycle assessment (LCA) to evaluate the benefits/impacts of circular economy (CE) strategies. In contrast, only eight studies (9.5%) deal with the life cycle costing (LCC) approach combined with other analyses while no paper deals with the social life cycle assessment (S-LCA) methodology. Global warming potential, eutrophication (for marine, freshwater, and terrestrial ecosystems), human toxicity, and ecotoxicity results are the most common LCA indicators applied. Only a few articles deal with the CE assessment through specific indicators. We argue that experts in life cycle methodologies must strive to adopt some key elements to ensure that the results obtained fit perfectly with the measurements of circularity and that these can even be largely based on a common basis.


2017 ◽  
Vol 67 ◽  
pp. 88-100 ◽  
Author(s):  
Lisa Winter ◽  
Annekatrin Lehmann ◽  
Natalia Finogenova ◽  
Matthias Finkbeiner

Offering efficient key management scheme (KMS) in WSN faces many challenges that will significantly impact the design and implementation of security protocols for WSN. The goal of KMS is to provide an effective environment in which the sensor node can communicate in a secure manner. It should be able to resolve the issue of generate, allocate the cryptographic keys in WSN in an efficient and effective manner. Hence, the methods for trustworthy allocation and management of these keys are very important for security of WSN. Many KMSs have been developed in recent years. However inherent characteristics of a WSN make incorporating security a great challenge. This paper presents a comprehensive review of current state-of-the-art of KMS designed for WSN security and compare with respect to several evaluation metrics. This paper also investigates the security requirements, goals and challenges of KMS based on existing literature reviews. We also attempt to provide insight in to potential research trends in the area of WSN security and outline the approaches that are likely to play a very important role.


Sign in / Sign up

Export Citation Format

Share Document