Skip to main content

On BAN Logics for Industrial Security Protocols

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2296))

Abstract

This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism is lacking, BAN logic provides an intuitive and powerful technique for security analysis.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abadi and M. Tuttle, A Semantics for a Logic of Authentication, in Proceedings of the ACM Symposium on Principles of Distributed Computing, p. 201–216, 1991.

    Google Scholar 

  2. N. Agray, The BAN Approach to Formal Verification: Authentication in GSM and SET, Master Thesis, Utrecht University Number INF/SCR-01-09 and KPN Research, Leidschendam (2001).

    Google Scholar 

  3. A. Bleeker and L. Meertens, A Semantics for BAN Logic, Proc. DIMACS workshop on Design and Formal Verification of Protocols, 1997, http://dimacs.rutgers.edu/Workshops/Security/program2/program.html.

  4. M. Burrows, M. Abadi and R. Needham, A Logic of Authentication, ACM Transactions on Computer Systems, vol. 8, p. 18–36, 1990.

    Article  Google Scholar 

  5. H. van Ditmarsch, Knowledge Games. PhD. thesis, Groningen, 2000, available at http://tcw2.ppsw.rug.nl/~hans.

  6. R. Fagin, J.Y. Halpern, Y. Moses and M.Y. Vardi, Reasoning About Knowledge, MIT Press, 1995.

    Google Scholar 

  7. M. Fasli, On Commitments, Roles and Obligations. This volume.

    Google Scholar 

  8. M. Fitting and R. Mendelsohn, First order modal logic, Kluwer, 1998.

    Google Scholar 

  9. L. Gong, R. Needham and R. Yahalom, Reasoning about Belief in Cryptographic Protocol Analysis, Proc. IEEE Symp. on Research in Security and Privacy, p. 234–248, 1990.

    Google Scholar 

  10. H. Gunnar, GSM Networks: Protocols, Terminology, and Implementations, Artech House 1999.

    Google Scholar 

  11. J.Y. Halpern and L.D. Zuck, A Little Knowledge Goes a Long Way: Simple Knowledge-Based Derivations and Correctness Proofs for a Family of Protocols, Proc. 6th ACM Symp. on Principles of Distributed Computing, 1987, p. 268–280.

    Google Scholar 

  12. J.-J.Ch. Meyer and W. van der Hoek, Epistemic Logic for AI and Computer Science, Cambridge University Press, 1995.

    Google Scholar 

  13. F. Stulp and R. Verbrugge, A knowledge-based algorithm for the Internet protocol TCP, to appear in the Bulletin of Economic Research, 2001. Also at http://tcw2.ppsw.rug.nl/prepublications

  14. P. Syverson, The Use of Logic in the Analysis of Cryptographic Protocols, in Proc. IEEE Symp. on Research in Security and Privacy, 1991.

    Google Scholar 

  15. G. Wedel and V. Kessler, Formal Semantics for Authentication Logics, Proc. ESORICS’96, p. 219–241, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Agray, N., van der Hoek, W., de Vink, E. (2002). On BAN Logics for Industrial Security Protocols. In: Dunin-Keplicz, B., Nawarecki, E. (eds) From Theory to Practice in Multi-Agent Systems. CEEMAS 2001. Lecture Notes in Computer Science(), vol 2296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45941-3_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-45941-3_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43370-5

  • Online ISBN: 978-3-540-45941-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics