Abstract
Model checking has being used mainly to check if a system satisfies the specifications expressed in temporal logic and people pay little attention to the problem for model checking logics of knowledge. However, in the distributed systems community, the desirable specifications of systems and protocols have been expressed widely in logics of knowledge. In this paper, based on the SMV, by the semantics of knowledge and set theory, approaches for model checking logics of knowledge and common knowledge are presented. These approaches make SMV’s functions extended from temporal logics to temporal logics of knowledge. We will illustrate in an example the applications to security verifications for a cryptographic protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Grumberg, O., Clarke, E.M., Peled, D.A.: Model Checking. The MIT Press, Cambridge (2000)
Vardi, M.Y.: Branching vs. linear time: final showdown. In: Margaria, T., Yi, W. (eds.) TACAS 2001. LNCS, vol. 2031, pp. 1–22. Springer, Heidelberg (2001)
van der Meyden, R., Shilov, N.S.: Model checking knowledge and time in systems with perfect recall. In: Pandu Rangan, C., Raman, V., Sarukkai, S. (eds.) FST TCS 1999. LNCS, vol. 1738, pp. 262–273. Springer, Heidelberg (1999)
van der Hoek, W., Wooldridge, M.: Model checking knowledge and time. In: Bošnački, D., Leue, S. (eds.) SPIN 2002. LNCS, vol. 2318, p. 95. Springer, Heidelberg (2002)
Halpern, J., Vardi, M.: The complexity of reasoning about knowledge and time: extended abstract. In: Proc. 18th Annual ACM Symposium on Theory of Computing, pp. 304–315 (1986)
Fagin, R., Halpern, J., Moses, Y., Vardi, M.: Reasoning about knowledge. MIT Press, Cambridge (1995)
Tatebayashi, M., Matsuzaki, N., Newman Jr., D.B.: Key distribution protocol for digital mobile communication systems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 324–334. Springer, Heidelberg (1990)
Su, K., Sattar, A., Wang, K., Luo, X., Governatori, G., Padmanabhan, V.: Observation-based model for BDI-agents. In: Proceedings of the Twentieth National Conference on Artificial Intelligence, AAAI 2005 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wu, L., Su, K., Chen, Q. (2005). Model Checking Temporal Logics of Knowledge and Its Application in Security Verification. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3801. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596448_50
Download citation
DOI: https://doi.org/10.1007/11596448_50
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30818-8
Online ISBN: 978-3-540-31599-5
eBook Packages: Computer ScienceComputer Science (R0)