Research Article

A Model Based Security Testing Method for Protocol Implementation

Table 1

Some security test cases for NSPK protocol.

Test 1 ?Dest, !Ask, ?Ask, ?sid, modify, !sid’, ?rid, forward, !rid, ?cipher, forward, !cip, !Ask’, ?Ask, ?sender, , ?receiver, , ?cipher, , !Rpl, ?Rpl, ?sid, forward, !sid, ?rid, forward, !rid, ?cipher, forward, !cip, !Rpl, ?Rpl, sender, fail;

Test 2 ?Dest, !Ask, ?Ask, ?sid, forward, !sid’, ?rid, forward, !rid, ?cipher, forward, !cip, !Ask’, ?Ask, ?sender, , ?receiver, , ?cipher, , !Rpl, ?Rpl, ?sid, forward, !sid, ?rid, forward, !rid, ?cipher, forward, !cip, !Rpl, ?Rpl, sender, pass;

Test 3 ?Dest, !Ask, ?Ask, ?sid, forward, !sid, ?rid, forward, !rid, ?cipher, forward, !cip, !Ask, ?Ask, ?sender, , ?receiver, , ?cipher, , !Rpl, ?Rpl, ?sid, forward, !sid, ?rid, forward, !rid, ?cipher, forward, !cip, !Rpl, ?Rpl, ?sender, , ?receiver, , ?cipher, , , !Cfm, ?sid, forward, !sid, ?rid, forward, !rid, ?cipher, forward, !cip, !Cfm, ?Cfm, ?sender, , ?receive, , ?cipher, , , pass;

Test 4 ?Dest, !Ask, ?Ask, ?sid, modify, !sid’, ?rid, forward, !rid, ?cipher, forward, !cip, !Ask’, ?Ask, ?sender, , ?receiver, , ?cipher, , !Rpl, ?Rpl, ?sid, modify, !sid’, ?rid, modify, !rid’, ?cipher, modify, !cip’, !Rpl’, ?Rpl, ?sender, , ?receiver, , ?cipher, , , !Cfm, ?sid, modify, !sid’, ?rid, modify, !rid’, ?cipher, modify, !cip’, !Cfm’, ?Cfm, ?sender, , ?receive, , ?cipher, , , fail;

Test 5 ?Dest, !Ask, ?Ask, ?sid, forward, !sid, ?rid, forward, !rid, ?cipher, forward, !cip, !Ask, ?Ask, ?sender, , ?receiver, , ?cipher, , !Rpl, ?Rpl, ?sid, forward, !sid, ?rid, forward, !rid, ?cipher, forward, !cip, !Rpl, ?Rpl, ?sender, , ?receiver, , ?cipher, , , !Cfm, ?sid, modify, !sid’, ?rid, forward, !rid, ?cipher, forward, !cip, !Cfm’, ?Cfm, ?sender, , ?receive, , ?cipher, , , fail;