2.4. Putting the network together
We now have a good idea of how reliable agents, the server, and even the intruder operate. In this final section of the chapter we will see how these are all put together into a network that can be used to test the resilience of the protocol.
You might expect to see a network consisting of many reliable agents, together with a server and the intruder. After all, the fact that Anne has run the protocol with other people first may well have a bearing on whether the run she starts with Bob is secure. However, the fact that our intruder is designed to be able to act like other agents mean that Carol, Duncan etc. do not actually have to be present as processes in our network in order for Anne to have done everything ...
Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.