Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks

被引:4
作者
Silva, Douglas Simoes [1 ]
Resner, Davi [1 ]
de Souza, Rick Lopes [1 ]
Martina, Jean Everson [1 ]
机构
[1] Univ Fed Santa Catarina, Dept Informat & Estat, Florianopolis, SC, Brazil
来源
INFORMATION SYSTEMS SECURITY | 2016年 / 10063卷
关键词
Wireless Sensor Networks; Internet of Things; Cross-layer; Security protocol analysis; Formal specification and verification; ENCRYPTION; INTERNET; THINGS;
D O I
10.1007/978-3-319-49806-5_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we verify the security aspects of a cross-layer, application-oriented communication protocol for Wireless Sensor Networks (WSN). The Trustful Space-Time Protocol (TSTP) encompasses a majority of features recurrently needed by WSN applications like medium access control, geographic routing, location estimation, precise time synchronization, secure communication channels and a key distribution scheme between sensors and the sink. Key distribution in TSTP happens after deployment via time-based session keys. The key distribution scheme relies on public cryptography primitives and synchronous clocks as shared data between the parties. We analyzed TSTP's key distribution protocol using ProVerif and we were able to find two security flaws: one related to the time synchronization component and another being a bad approach related to a mac-then-encrypt method employed. With our findings we propose an improved version of the key distribution protocol, where we change the message authentication scheme in the initial message exchange so that ProVerif's goals are fulfilled; we also introduce the encrypt-then-mac method so that secret information passing through the communication channel has integrity and does not fall to known attacks.
引用
收藏
页码:426 / 443
页数:18
相关论文
共 28 条
  • [1] [Anonymous], 2015 IEEE 20 C EM TE
  • [2] [Anonymous], PROVERIF 1 90 AUTOMA
  • [3] [Anonymous], 21 IEEE INT IN PRESS
  • [4] [Anonymous], 4 SENSORNETS
  • [5] [Anonymous], INDIAN J SCI TECHNOL
  • [6] [Anonymous], P C MOB PERV COMP CO
  • [7] [Anonymous], CHALL REAL INT THING
  • [8] [Anonymous], 2006, P 9 ACM INT S MOD AN, DOI DOI 10.1145/1164717.1164742
  • [9] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [10] Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    Bellare, Mihir
    Namprempre, Chanathip
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (04) : 469 - 491