Modeling and Analysis of the Security Protocol in C-DAX Based on Process Algebra

  • Ailun Liu
  • , Huibiao Zhu*
  • , Yuan Fei
  • , Shuangqing Xiang
  • , Gang Lu
  • , Wanling Xie
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The security protocol is proposed as a security solution for end-to-end communication between smart grid applications in the EU FP7 project C-DAX. Since the importance and widespread use of the security protocol, it is of great significance to formally analyze and verify relevant security properties of this security protocol. In this paper, we apply Communicating Sequential Processes (CSP) to model the security protocol. Further, we use the model checker Process Analysis Toolkit (PAT) to automatically simulate the developed model, and verify whether the model caters for the specification and relevant secure properties, e.g. reachability of the fake goal. Our modeling and verification show that a risk may exist in the security protocol.

Original languageEnglish
Title of host publicationProceedings - 2017 IEEE 41st Annual Computer Software and Applications Conference, COMPSAC 2017
EditorsClaudio Demartini, Thomas Conte, Motonori Nakamura, Chung-Horng Lung, Zhiyong Zhang, Kamrul Hasan, Sorel Reisman, Ling Liu, William Claycomb, Hiroki Takakura, Ji-Jiang Yang, Edmundo Tovar, Stelvio Cimato, Sheikh Iqbal Ahamed, Toyokazu Akiyama
PublisherIEEE Computer Society
Pages39-44
Number of pages6
ISBN (Electronic)9781538603673
DOIs
StatePublished - 7 Sep 2017
Event41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017 - Torino, Italy
Duration: 4 Jul 20178 Jul 2017

Publication series

NameProceedings - International Computer Software and Applications Conference
Volume1
ISSN (Print)0730-3157

Conference

Conference41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017
Country/TerritoryItaly
CityTorino
Period4/07/178/07/17

Keywords

  • C-DAX
  • Formalization
  • The Security Protocol
  • Verification

Fingerprint

Dive into the research topics of 'Modeling and Analysis of the Security Protocol in C-DAX Based on Process Algebra'. Together they form a unique fingerprint.

Cite this