作者: Suratose Tritilanunt , Ernest Foo , Juan Gonzalez Nieto , Colin Boyd
DOI:
关键词: Key exchange 、 Universal composability 、 Host Identity Protocol 、 Computer science 、 Protocol (science) 、 Petri net 、 Transport Layer Security 、 Distributed computing 、 Internet Protocol 、 CPN Tools
摘要: In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and other Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To such protocols, develop formal framework based on Timed Coloured Petri Nets (Timed CPNs) use simulation approach provided CPN Tools achieve analysis. By adopting idea of Meadows' cost-based re¯ning de¯nition operational costs during execution, our provides accurate cost estimate execution compar- ing among principals, as well percentage successful connections from legitimate users, under four di®erent strategies DoS attack.