Advanced search

Found 3 essays matching the above criteria.

  1. 1. Formal security verification of the Drone Remote Identification Protocol using Tamarin

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Jakob Ahokas; Jonathan Persson; [2022]
    Keywords : Cybersecurity; Formal verification; Unmanned aircraft; Cryptography;

    Abstract : The current standard for remote identification of unmanned aircraft does not contain anyform of security considerations, opening up possibilities for impersonation attacks. Thenewly proposed Drone Remote Identification Protocol aims to change this. READ MORE

  2. 2. Formal security analysis of authentication in an asynchronous communication model

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jacob Wahlgren; Sam Yousefzadegan Hedin; [2020]
    Keywords : formal verification; Tamarin Prover; formal analysis; information security; authentication; formell verifiering; Tamarin Prover; formell analys; informationssäkerhet; autentisering;

    Abstract : Formal analysis of security protocols is becoming increasingly relevant. In formal analysis, a model is created of a protocol or system, and propositions about the security of the model are written. A program is then used to verify that the propositions hold, or find examples of where they do not. READ MORE

  3. 3. Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Katharina Pfeffer; [2014]
    Keywords : security; authenticated key-exchange; 3GPP; LTE; formal methods; protocol verification; automated model checking; säkerhet; autentiserad etablering av nycklar; 3GPP; LTE; formella metoder; protokollverifiering; automatiserad modellverifiering;

    Abstract : Security protocols are ubiquitously used in various applications with the intention to ensure secure and private communication. To achieve this goal, a mechanism offering reliable and systematic protocol verification is needed. READ MORE