Security in Wireless Sensor Networks: A formal verification of protocols

被引:0
|
作者
Nandi, Giann Spilere [1 ]
Pereira, David [1 ]
Vigil, Martin [2 ]
Moraes, Ricardo [2 ]
Morales, Analucia Schiaffino [2 ]
Araujo, Gustavo [2 ]
机构
[1] CISTER Res Ctr Real Time & Embedded Comp Syst, Porto, Portugal
[2] Univ Fed Santa Catarina, Florianopolis, SC, Brazil
关键词
Wireless Sensor Networks; Security; Formal Verification; AUTHENTICATION; INTERNET; THINGS;
D O I
10.1109/indin41052.2019.8972080
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increase of the digitalization taking place in various industrial domains is leading developers towards the design and implementation of more and more complex networked control systems (NCS) supported by Wireless Sensor Networks (WSN). This naturally raises new challenges for the current WSN technology, namely in what concerns improved guarantees of technical aspects such as real-time communications together with safe and secure transmissions. Notably, in what concerns security aspects, several cryptographic protocols have been proposed. Since the design of these protocols is usually error-prone, security breaches can still be exposed and maliciously exploited unless they are rigorously analyzed and verified. In this paper we formally verify, using ProVerif, three cryptographic protocols used in WSN, regarding the security properties of secrecy and authenticity. The security analysis performed in this paper is more robust than the ones performed in related work. Our contributions involve analyzing protocols that were modeled considering an unbounded number of participants and actions, and also the use of a hierarchical system to classify the authenticity results. Our verification shows that the three analyzed protocols guarantee secrecy, but can only provide authenticity in specific scenarios.
引用
收藏
页码:425 / 431
页数:7
相关论文
共 50 条
  • [21] Integrated Protocols to Ensure Security Services in Wireless Sensor Networks
    Faisal, Mohammed
    Al-Muhtadi, Jalal
    Al-Dhelaan, Abdullah
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [22] Review of Platforms and Security Protocols suitable for Wireless Sensor Networks
    Moeller, S.
    Newe, T.
    Lochmann, S.
    2009 IEEE SENSORS, VOLS 1-3, 2009, : 1001 - +
  • [23] Formal verification: an imperative step in the design of security protocols
    Coffey, T
    Dojen, R
    Flanagan, T
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 43 (05): : 601 - 618
  • [24] An improved method for formal security verification of cryptographic protocols
    Watanabe, H
    Fujiwara, T
    Kasami, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1996, E79A (07) : 1089 - 1096
  • [25] A Formal Specification and Verification Framework for Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Sun, Meng
    Dong, Jin-Song
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 44 (08) : 725 - 746
  • [26] Formal verification of type flaw attacks in security protocols
    Long, BW
    ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2003, : 415 - 424
  • [27] Data Link Layer Security Protocols in Wireless Sensor Networks: A Survey
    AlMheiri, Saleha Mubarak
    AlQamzi, Hend Saeed
    2013 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2013, : 312 - 317
  • [28] A Framework for Formal Verification of Security Protocols in C plus
    Pradeep, R.
    Sunitha, N. R.
    Ravi, V
    Verma, Sushma
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 163 - 175
  • [29] Security Analysis of Secure Data Aggregation Protocols in Wireless Sensor Networks
    Rahayu, Triana Mugia
    Lee, Sang-Gon
    Lee, Hoon-Jae
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 471 - 474
  • [30] Privacy and Security in Wireless Sensor Networks: Protocols, Algorithms, and Efficient Architectures
    Saponara, Sergio
    Solanas, Agusti
    Avoine, Gildas
    Neri, Bruno
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2013, 2013