The protocol analysis must be based on the petri nets theory. Following the petri net model and formal specifications and the analysis should focus on at least two properties.
I would recommend [1] as reference. Once read, you can ask more specific questions in this thread or contact me directly with questions specific to the implementation.
Regards
[1]Crazzolara, F., & Winskel, G. (2001, April). Petri nets in cryptographic protocols. In ipdps (Vol. 1, p. 149). Available at: