Security in Wireless Sensor Networks: A formal verification of protocols

被引:0
|
作者
Nandi, Giann Spilere [1 ]
Pereira, David [1 ]
Vigil, Martin [2 ]
Moraes, Ricardo [2 ]
Morales, Analucia Schiaffino [2 ]
Araujo, Gustavo [2 ]
机构
[1] CISTER Res Ctr Real Time & Embedded Comp Syst, Porto, Portugal
[2] Univ Fed Santa Catarina, Florianopolis, SC, Brazil
关键词
Wireless Sensor Networks; Security; Formal Verification; AUTHENTICATION; INTERNET; THINGS;
D O I
10.1109/indin41052.2019.8972080
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increase of the digitalization taking place in various industrial domains is leading developers towards the design and implementation of more and more complex networked control systems (NCS) supported by Wireless Sensor Networks (WSN). This naturally raises new challenges for the current WSN technology, namely in what concerns improved guarantees of technical aspects such as real-time communications together with safe and secure transmissions. Notably, in what concerns security aspects, several cryptographic protocols have been proposed. Since the design of these protocols is usually error-prone, security breaches can still be exposed and maliciously exploited unless they are rigorously analyzed and verified. In this paper we formally verify, using ProVerif, three cryptographic protocols used in WSN, regarding the security properties of secrecy and authenticity. The security analysis performed in this paper is more robust than the ones performed in related work. Our contributions involve analyzing protocols that were modeled considering an unbounded number of participants and actions, and also the use of a hierarchical system to classify the authenticity results. Our verification shows that the three analyzed protocols guarantee secrecy, but can only provide authenticity in specific scenarios.
引用
收藏
页码:425 / 431
页数:7
相关论文
共 50 条
  • [41] A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks
    Cinzia Bernardeschi
    Gianluca Dini
    Maurizio Palmieri
    Francesco Racciatti
    Journal of Computer Virology and Hacking Techniques, 2021, 17 : 249 - 263
  • [42] An approach to the formal verification of the three-principal security protocols
    Zhang, YQ
    Liu, XY
    Feng, DG
    SAM '05: Proceedings of the 2005 International Conference on Security and Management, 2005, : 163 - 169
  • [43] A formal methodology for integral security design and verification of network protocols
    Diaz, Jesus
    Arroyo, David
    Rodriguez, Francisco B.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 89 : 87 - 98
  • [44] Using temporal logics of knowledge in the formal verification of security protocols
    Dixon, C
    Gago, MCF
    Fisher, M
    van der Hoek, W
    11TH INTERNATIONAL SYMPOSIUM ON TEMPORAL REPRESENTATION AND REASONING, PROCEEDINGS, 2004, : 148 - 151
  • [45] SPINS: Security Protocols for Sensor Networks
    Adrian Perrig
    Robert Szewczyk
    J.D. Tygar
    Victor Wen
    David E. Culler
    Wireless Networks, 2002, 8 : 521 - 534
  • [46] SPINS: Security protocols for sensor networks
    Perrig, A
    Szewczyk, R
    Tygar, JD
    Wen, V
    Culler, DE
    WIRELESS NETWORKS, 2002, 8 (05) : 521 - 534
  • [47] SPINS: Security Protocols for Sensor Networks
    Ullah, Fasee
    Mehmood, Tahir
    Habib, Masood
    Ibrahim, Muhammad
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING (IACSIT ICMLC 2009), 2009, : 333 - 337
  • [48] On Formal Modeling and Validation of Wireless Sensor Network Protocols
    Bechar, Rachid
    Tahar Abbes, Mounir
    Mezoudj, Fareha
    Bellatreche, Ladjel
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) : 2855 - 2888
  • [49] On Formal Modeling and Validation of Wireless Sensor Network Protocols
    Rachid Bechar
    Mounir Tahar Abbes
    Freha Mezzoudj
    Ladjel Bellatreche
    Wireless Personal Communications, 2020, 114 : 2855 - 2888
  • [50] Addressing protocols for wireless sensor networks
    Du, Zhi-Gao
    Qian, De-Pei
    Liu, Yi
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (10): : 2787 - 2798