Skip to main content

Formal Analysis of TESLA Protocol in the Timed OTS/CafeOBJ Method

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNTCS,volume 7610)

Abstract

The Timed Observational Transition System (TOTS)/CafeOBJ method is a version of the OTS/CafeOBJ method for modeling, specification and verification of distributed systems and protocols with real time constraints. In this paper we report on a case study from the field of source authentication protocols, TESLA protocol, to show the application of the method to such complex systems. We prove that our model of the protocol satisfies that the receiver does not accept as authentic any message unless it was actually sent by the sender. To verify the property we have used several other invariants which include timing information. To our knowledge, this is the first time that the method has been applied to the formal analysis of such a complex protocol.

Keywords

  • Algebraic Specification
  • Source Authentication
  • TESLA
  • CafeOBJ
  • Timed Observational Transition Systems
  • Formal Verification

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ogata, K., Futatsugi, K.: Modeling and Verification of real-time systems based on equations. In: Science of Computer Programming. Elsevier (2007)

    Google Scholar 

  2. Ogata, K., Futatsugi, K.: Some Tips on Writing Proof Scores in the OTS/CafeOBJ Method. In: Futatsugi, K., Jouannaud, J.-P., Meseguer, J. (eds.) Goguen Festschrift. LNCS, vol. 4060, pp. 596–615. Springer, Heidelberg (2006)

    Google Scholar 

  3. Ogata, K., Futatsugi, K.: Flaw and modification of the iKP electronic payment protocols. IPL 86(2), 57–62 (2003)

    CrossRef  MathSciNet  Google Scholar 

  4. Ogata, K., Futatsugi, K.: Equational approach to formal analysis of TLS. In: Proc. 25th ICDCS, pp. 795–804 (2005)

    Google Scholar 

  5. Ogata, K., Futatsugi, K.: Proof score approach to analysis of electronic commerce protocols. IJSEKE 20(2), 253–287 (2010)

    Google Scholar 

  6. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proc. IEEE Symposium on Security and Privacy, pp. 56–73 (2000)

    Google Scholar 

  7. Perrig, A., Tygar, J.D.: Secure Broadcast Authentication. In: Wired and Wireless Networks. Springer (2002)

    Google Scholar 

  8. Perrig, A., Canetti, R., Tygar, J.D., Briscoe, B., Song, D.: TESLA: Multicast Source Authentication Transform. IETF RFC 4082 (2005)

    Google Scholar 

  9. Diaconescu, R., Futatsugi, K.: CafeOBJ Report. World Scientific, Singapore (1998)

    Google Scholar 

  10. Abadi, M., Lamport, L.: An old fashioned recipe for real time. ACM Transactions on Programming Languages and Systems 16(5), 1543–1571 (1994)

    CrossRef  Google Scholar 

  11. Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. IEEE Trans. on Inf. Theory 29, 198–208 (1983)

    CrossRef  MathSciNet  MATH  Google Scholar 

  12. Seino, T., Ogata, K., Futatsugi, K.: A toolkit for generating and displaying proof scores in the OTS/CafeOBJ method. In: Proc. of the 6th RULE. ENTCS. Elsevier (2005)

    Google Scholar 

  13. Nakano, M., Ogata, K., Nakamura, M., Futatsugi, K.: Crème: An automatic invariant prover of behavioural specifications. IJSEKE 17(6), 783–804 (2007)

    Google Scholar 

  14. Ogata, K., Nakano, M., Kong, W., Futatsugi, K.: Induction-Guided Falsification. In: Liu, Z., Kleinberg, R.D. (eds.) ICFEM 2006. LNCS, vol. 4260, pp. 114–131. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  15. Archer, M.: Proving correctness of the basic TESLA multicast stream authentication protocol with TAME. In: Proc. of WITS 2002, Portland (2002)

    Google Scholar 

  16. Broadfoot, P., Lowe, G.: Analysing a Stream Authentication Protocol Using Model Checking. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, pp. 146–161. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  17. Lomuscio, A., Raimondi, F., Wozna, B.: Verification of the TESLA protocol in MCMAS-X. Fundamenta Informaticae 79(1-2), 473–486 (2007)

    MathSciNet  MATH  Google Scholar 

  18. Archer, M.: TAME: Using PVS strategies for special-purpose theorem proving. Annals of Mathematics and Artificial Intelligence 29(1-4) (2000)

    Google Scholar 

  19. Shankar, N., Owre, S., Rushby, J.M., Stringer-Calvert, D.W.J.: The PVS prover guide. Technical Report, Computer Science Lab., SRI Intl. Menlo Park, CA (1998)

    Google Scholar 

  20. Lynch, N., Vaandrager, F.: Forward and backward simulations – Part II: Timing based systems. Information and Computation 128(1), 1–25 (1996)

    CrossRef  MathSciNet  MATH  Google Scholar 

  21. Hoare, C.A.R.: Communicating Sequential Processes. Prentice Hall (1985)

    Google Scholar 

  22. Formal Systems Europe Ltd. Failures – Divergence Refinement – FDR2 User Manual (2000)

    Google Scholar 

  23. Lomuscio, A., Wozna, B.: A complete and decidable security-specialised logic and its application to the tesla protocol. In: Stone, P., Weiss, G. (eds.) Proc. of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), pp. 145–152 (2006)

    Google Scholar 

  24. Clavel, M., et al.: Maude: Specification and Programming in Rewriting Logic. TCS 285(2), 187–243 (2002)

    CrossRef  MathSciNet  MATH  Google Scholar 

  25. Ölveczky, P.C., Meseguer, J.: Real-Time Maude: A tool for simulating and analyzing real time and hybrid systems. In: 4th WRLA. ENTCS, vol. 36 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ouranos, I., Ogata, K., Stefaneas, P. (2012). Formal Analysis of TESLA Protocol in the Timed OTS/CafeOBJ Method. In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification and Validation. Applications and Case Studies. ISoLA 2012. Lecture Notes in Computer Science, vol 7610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34032-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34032-1_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34031-4

  • Online ISBN: 978-3-642-34032-1

  • eBook Packages: Computer ScienceComputer Science (R0)