A Calculus for the Analysis of Wireless Network Security Protocols

被引:0
|
作者
Ballardin, Francesco [1 ]
Merro, Massimo [1 ]
机构
[1] Univ Verona, Dipartimento Informat, I-37100 Verona, Italy
来源
关键词
FRAMEWORK; MODELS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a timed broadcasting calculus for wireless systems. The operational semantics of our calculus is given both in terms of a Reduction Semantics and in terms of a Labelled Transition Semantics. We prove that the two semantics coincide. The labelled transition system is used to derive a standard notion of (weak) bi-similarity which is proved to be a congruence. We use our simulation theory to adapt Gorrieri and Martinelli's tGNDC scheme to investigate, in our setting, the safety of non-trivial wireless network security protocols.
引用
收藏
页码:206 / 222
页数:17
相关论文
共 50 条
  • [21] Security Survey of the IoT Wireless Protocols
    Krejci, Radek
    Hujnak, Ondrej
    Svepes, Marek
    [J]. 2017 25TH TELECOMMUNICATION FORUM (TELFOR), 2017, : 60 - 63
  • [22] Security Protocols for Wireless Sensor Networks
    Bhalla, Monika
    Pandey, Nitin
    Kumar, Brijesh
    [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1005 - 1009
  • [23] Network calculus modeling and QoS analysis for wireless packet networks
    Xu haibo
    Gao youjun
    Tian hui
    Ji yang
    Zhang Ping
    [J]. 2007 IEEE 65TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2007, : 919 - 923
  • [24] A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols
    Tan, Whye Kit
    Lee, Sang-Gon
    Lam, Jun Huy
    Yoo, Seong-Moo
    [J]. SENSORS, 2013, 13 (09) : 11553 - 11585
  • [25] Network Security and Networking Protocols
    Sharma, Arvind Kumar
    Lamba, Chattar Singh
    [J]. RECENT TRENDS IN NETWORKS AND COMMUNICATIONS, 2010, 90 : 90 - 97
  • [26] LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory
    Wu, Fusheng
    Liu, Jinhui
    Li, Yanbin
    Ni, Mingtao
    [J]. IET INFORMATION SECURITY, 2024, 2024
  • [27] Security Mechanisms in Network Protocols
    Kolodziejczyk, Marcin
    Ogiela, Marek R.
    [J]. UKSIM-AMSS FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS, MODELLING AND SIMULATION, 2010, : 427 - 430
  • [28] Security analysis of application layer protocols on wireless local area networks
    Yang M.-H.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (5) : 586 - 592
  • [29] Security Analysis of Application Layer Protocols on Wireless Local Area Networks
    杨明豪
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (05) : 586 - 592
  • [30] Security analysis of two anonymous authentication protocols for distributed wireless networks
    Wong, DS
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 284 - 288