A Calculus for the Analysis of Wireless Network Security Protocols

被引:0
|
作者
Ballardin, Francesco [1 ]
Merro, Massimo [1 ]
机构
[1] Univ Verona, Dipartimento Informat, I-37100 Verona, Italy
来源
关键词
FRAMEWORK; MODELS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a timed broadcasting calculus for wireless systems. The operational semantics of our calculus is given both in terms of a Reduction Semantics and in terms of a Labelled Transition Semantics. We prove that the two semantics coincide. The labelled transition system is used to derive a standard notion of (weak) bi-similarity which is proved to be a congruence. We use our simulation theory to adapt Gorrieri and Martinelli's tGNDC scheme to investigate, in our setting, the safety of non-trivial wireless network security protocols.
引用
收藏
页码:206 / 222
页数:17
相关论文
共 50 条
  • [1] A calculus for control flow analysis of security protocols
    Mikael Buchholtz
    Hanne Riis Nielson
    Flemming Nielson
    [J]. International Journal of Information Security, 2004, 2 (3-4) : 145 - 167
  • [2] A simple process calculus for the analysis of security protocols
    Gu, YG
    Fu, YX
    Li, GQ
    [J]. PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 110 - 114
  • [3] Bioinspired Security Analysis of Wireless Protocols
    Petrocchi, Marinella
    Spognardi, Angelo
    Santi, Paolo
    [J]. MOBILE NETWORKS & APPLICATIONS, 2016, 21 (01): : 139 - 148
  • [4] Bioinspired Security Analysis of Wireless Protocols
    Marinella Petrocchi
    Angelo Spognardi
    Paolo Santi
    [J]. Mobile Networks and Applications, 2016, 21 : 139 - 148
  • [5] A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network protocols
    Li, Qin
    Zeng, Qingkai
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 232 - 239
  • [6] Quantitative analysis of security protocols in wireless networks
    Best, P
    Namuduri, K
    Pendse, R
    [J]. IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 290 - 291
  • [7] Investigating the Prevalent Security Techniques in Wireless Sensor Network Protocols
    O'Mahony, George D.
    Harris, Philip J.
    Murphy, Colin C.
    [J]. 2019 30TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2019,
  • [8] PROPOSAL OF SECURITY PROTOCOLS FOR THE LOCAL WIRELESS NETWORK OF THE CIENFUEGOS UNIVERSITY
    Gonzalez Paz, Alex
    Beltran Casanova, David
    Fuentes Gari, Ernesto Roberto
    [J]. REVISTA UNIVERSIDAD Y SOCIEDAD, 2016, 8 (04): : 128 - 135
  • [9] Analysis of Network Management Protocols in Wireless Sensor Network
    Zhang, Bin
    Li, Guohui
    [J]. 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 546 - 549
  • [10] FORMAL ANALYSIS OF SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORKS
    Novotny, Marian
    [J]. CECC '09: 9TH CENTRAL EUROPEAN CONFERENCE ON CRYPTOGRAPHY - TREBIC, 2010, 47 : 81 - 97