We develop a formal model of the Host Identity Protocol (HIP) based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. We aim to examine unbalanced computation that leads to resource exhaustion attacks in key exchange protocols comparing among a legitimate initiator, four types of adversary who attempt to deny the service at different stages of the protocol execution, and a responder. By adopting the key idea of Meadows' cost-based framework and refining the definition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution comparing between those principals. Under four defined attack strategies, however, Meadows' cost-based framework generates a different outcome compared with the simulation approach from Timed CPNs. Analysis of our experimental results reveals a limitation of Meadows' cost-based framework for addressing DoS threats.
机译:最佳的基于时间和成本的协调项目合同,且工作率不可观察
机译:基于时间的患者发作总成本分析髋关节置换术案例研究
机译:在基于时间的区别的运费策略下,集装箱航行速度和舰队部署优化
机译:HIP中基于成本和基于时间的DoS抵抗性分析
机译:逻辑程序的非终止分析和基于成本的优化。
机译:筛查青春期男性沙眼衣原体:基于成本的决策分析。
机译:HIP中基于成本和基于时间的DoS抵抗性分析