Skip to Main content Skip to Navigation
Preprints, Working Papers, ...

Model Checking the IKEv2 Protocol Using Spin

Abstract : Previous analyses of IKEv2 concluded that the protocol was suffering from two authentication vulnerabilities: the penultimate authentication flaw and a vulnerability that leads to a reflection attack. In this paper we analyze the IKEv2 protocol specification using the Spin model checker. To do so we extend and improve an existing modeling method that allows analyzing security protocols using Spin. For completeness we indicate each abstraction we make when writing the model. As a result we show that the reflection attack is actually not applicable. We further discuss two modifications of the protocol that we prove to be effective against the penultimate authentication flaw.
Complete list of metadatas

Cited literature [24 references]  Display  Hide  Download

https://hal.inria.fr/hal-02062292
Contributor : Tristan Ninet <>
Submitted on : Friday, March 8, 2019 - 4:58:40 PM
Last modification on : Wednesday, June 24, 2020 - 4:19:47 PM
Long-term archiving on: : Monday, June 10, 2019 - 9:27:20 AM

File

fortemc.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-02062292, version 1

Citation

Tristan Ninet, Axel Legay, Romaric Maillard, Louis-Marie Traonouez, Olivier Zendra. Model Checking the IKEv2 Protocol Using Spin. 2019. ⟨hal-02062292v1⟩

Share

Metrics

Record views

109

Files downloads

140