Dr. Reiner Dojen      


Position:
Lecturer
Department of Electronic and Computer Engineering,
University of Limerick,
Limerick, Ireland

Academic Degrees:
PhD, 2004, University of Limerick, Ireland.
MEng, 2000, University of Limerick, Ireland.
Dipl.Ing.(FH), 1999, FH Osnabrück, University of Applied Science, Germany.
e-mail: reiner.dojen@ul.ie Tel: +353-61-213442 Fax: +353-61-338176

Research Interests:

Cryptographic Protocols:
My research on cryptographic protocols focuses on the development and verification of cryptographic protocols. The work on verification includes both, manual and automated techniques. Contributions so far include the verification of a number of cryptographic protocols, discovery of hitherto unknown protocol flaws, the publication of new, verifiably secure protocols and the development of a novel technique for the automation of logic-based verification.

Automated Reasoning:
The research on automated reasoning concerns the automation of modal logics. Particular focus is given to modal logics for verification purposes. Contributions so far include the development of a novel technique for the automation of verification logics and the implementation of automated verification tools for cryptographic protocols

Cryptography/Cryptanalysis:
My work in cryptography/cryptanalysis focuses on investigating the cryptographic strength of symmetric block ciphers. Major contributions include an analysis of the ICE cipher and the development of a novel cryptanalytic technique called conditional linear cryptanalysis.

Network Security
My research in network security concerns the development of network intrusion detection and prevention systems. Major contributions include analyses of the security of intrusion detection and prevention systems and the development of an integrated security architecture.


Research Project Participation:

Project:A New Automated Logic Theory with Attack Detection Capability for the Formal Analysis of Security Protocols
Principal Investigator:Prof. Tom Coffey
Funded by:Science Foundation Ireland (SFI) Research Frontiers Programme Award 11/RFP.1/CMS/3340
Project Duration:July 2011 - August 2015
Involvement:Collaborator, July 2011 - August 2015
 
Project:Unified Verification for Security Protocol Design
Principal Investigator:Prof. Tom Coffey
Funded by:Science Foundation Ireland (SFI) Research Frontiers Programme Award 07/RFP/CMSF631
Project Duration:October 2007 - September 2012
Involvement:Collaborator, October 2007 - September 2012
 
Project: A new logic for automated verification of advanced security protocols
Funded by:Irish Research Council for Science, Engineering and Technology - Embark Initiative
Project Duration:October 2007 - September 2011
Involvement:Joint Supervisor
 
Project:Automatable Verification Logic for Cryptographic Protocols
Funded by:Irish Research Council for Science, Engineering and Technology - Embark Initiative
Project Duration:October 2007 - September 2011
Involvement:Joint Supervisor
 
Project:A Unified Specification Language for Cryptographic Security Protocols
Funded by:Irish Research Council for Science, Engineering and Technology - Embark Initiative
Project Duration:October 2007 - September 2011
Involvement:Joint Supervisor
 
Project:Formal Verification of Security Protocols using State-Space Approaches
Funded by:Irish Research Council for Science, Engineering and Technology - Embark Initiative
Project Duration:October 2003 - September 2006
Involvement:Joint Supervisor
 
Project:Automated Verification of Security Protocols
Principal Investigator:Prof. Tom Coffey
Funded by:Irish Research Council for Science, Engineering and Technology - Basic Research Award SC/02/237
Project Duration:October 2002 - September 2005
Involvement:Collaborator, October 2002 - September 2005
Responsibility:Development of automation techniques for verification logics. Development of specification languages for cryptographic protocols. Research student supervision.
 
Project:Bearbeitung von Korrosionsproblemen mit Neuronalen Netzen
Principal Investigator:Prof. Theodor Gervens
Funded by:Arbeitsgruppe Innovative Projeckte (AGIP), Ministerium für Wissenschaft und Kulur (Ministry of Science and Culture)
Project Duration:October 1997 - September 1999
Involvement:Research Assistant, June 1999 - July 1999
Responsibility:Development of a graphical interface to configure neural networks and to display their results.
 
Project:Projekt Querhacke
Principal Investigator:Prof. Arno Ruckelshausen
Funded by:Deutsche Bundesstiftung Umwelt (German Federal Foundation for Environment)
Project Duration:October 1996 - September 1999
Involvement:Research Assistant, August 1999
Responsibility:Investigation into the quality of statistical methods for data processing.

Selected Publications:

  • Jurcut, A., Coffey, T. and Dojen, R., "Design Guidelines for Security Protocols to Prevent Replay & Parallel Session Attacks", Elsevier Computer & Security, Volume 45, September 2014, pp. 255-273
  • Dojen, R., Zhang, F., "EWAIP: an Empirical Wireless Sensor Network Applications Implementation Platform", Third International Conference on Future Generation Communication Technologies, Luton, UK, 13-15 August 2014
  • Dojen, R., Chen, J. and Coffey, T., "On Modelling Security Protocols for Logic-based Verification", 25th IET Irish Signals & System Conference, 26-27 June 204, Limerick, Ireland
  • Jurcut, A., Coffey, T. and Dojen, R., "Establishing and Fixing Security Protocol Weaknesses Using a Logic-based Verification Tool", Journal of Communications, Volume 8, Issue 11, November 2013, pp. 795-805
  • Lasc, I., Dojen, R. and Coffey, T., "On the Detection of Desynchronisation Attacks against Security Protocols that use Dynamic Shared Secrets", Elsevier Computers & Security, Volume 32, February 2013, pp. 115-129
  • Lasc, I., Dojen, R. and Coffey, T., "Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications", Elsevier Computers & Electrical Engineering (Special Issue on Modern Trends in Applied Security: Architectures, Implementations and Applications), Volume 37, Issue 2, March 2011, pp.160-168
  • Zhang, F., Dojen, R. and Coffey, T., "Comparative performance and energy consumption analysis of different AES implementations on a Wireless Sensor Newtork Node", Inderscience International Journal of Sensor Networks (IJSNET), Volume 10, No 4, 2011, pp. 192-201
  • Lasc, I., Dojen, R. and Coffey, T., "A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications", IGI International Journal of Information Security and Privacy, Volume 5, Issue 1, January 2011, pp. 33-49
  • Dojen, R., Pasca, V. and Coffey, T., "Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications" In: Security and Privacy in Mobile Information and Communication Systems, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (LNICST), Vol. 17, September 2009, pp. 278-287
  • 7. Dojen, R., Zhang, F. and Coffey, T., "On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks", In: IEEE International Conference on Performance Computing and Communications, December 2008, pp. 499-506
  • Dojen, R. and Coffey, T., "Layered Proving Trees: A Novel Approach to the Automation of Logic-Based Security Protocol Verification", ACM Transactions on Information and System Security (TISSEC), Volume 8, Issue 3, August 2005, pp. 287-311.
  • Dojen, R. and Coffey, T., "Conditional Linear Cryptanalysis - Applying Linear Cryptanalysis to Ciphers with Key-Dependant Operations". WSEAS Transactions on Computers, Volume 3, Issue 5, November 2004, pp.1425-1430.
  • Coffey, T., Dojen, R. and Flanagan, T., "Formal Verification: An Imperative Step in the Design of Security Protocols", Computer Networks Journal, Elsevier Science, Volume 43, Number 5, 5 December 2003, pp.601-618.