Research Article

Formal Analysis of the Security Protocol with Timestamp Using SPIN

Table 2

Experimental data of WMF protocol.

WMF protocol modelModel 1 (using synchronization channel)Model 2 (using asynchronous channels)
Security propertiesStatesTransitionsStatesTransitions

Authentication323398361448
Freshness47505154

Note. The experimental results are obtained by using SPIN6.5.1, CPU Intel(R) Core (TM)i5-6300HQ (2.3 GHz), RAM 2 GB, and the operating system platform Ubuntu 18.04.6 virtual machine experimental environment. The parameter of the state search method is depth-first search, and the parameter value of the search depth is 10000 (default value).