Security in Wireless Sensor Networks: A formal verification of protocols

被引:0
|
作者
Nandi, Giann Spilere [1 ]
Pereira, David [1 ]
Vigil, Martin [2 ]
Moraes, Ricardo [2 ]
Morales, Analucia Schiaffino [2 ]
Araujo, Gustavo [2 ]
机构
[1] CISTER Res Ctr Real Time & Embedded Comp Syst, Porto, Portugal
[2] Univ Fed Santa Catarina, Florianopolis, SC, Brazil
来源
2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN) | 2019年
关键词
Wireless Sensor Networks; Security; Formal Verification; AUTHENTICATION; INTERNET; THINGS;
D O I
10.1109/indin41052.2019.8972080
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increase of the digitalization taking place in various industrial domains is leading developers towards the design and implementation of more and more complex networked control systems (NCS) supported by Wireless Sensor Networks (WSN). This naturally raises new challenges for the current WSN technology, namely in what concerns improved guarantees of technical aspects such as real-time communications together with safe and secure transmissions. Notably, in what concerns security aspects, several cryptographic protocols have been proposed. Since the design of these protocols is usually error-prone, security breaches can still be exposed and maliciously exploited unless they are rigorously analyzed and verified. In this paper we formally verify, using ProVerif, three cryptographic protocols used in WSN, regarding the security properties of secrecy and authenticity. The security analysis performed in this paper is more robust than the ones performed in related work. Our contributions involve analyzing protocols that were modeled considering an unbounded number of participants and actions, and also the use of a hierarchical system to classify the authenticity results. Our verification shows that the three analyzed protocols guarantee secrecy, but can only provide authenticity in specific scenarios.
引用
收藏
页码:425 / 431
页数:7
相关论文
共 50 条
  • [1] FORMAL ANALYSIS OF SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORKS
    Novotny, Marian
    CECC '09: 9TH CENTRAL EUROPEAN CONFERENCE ON CRYPTOGRAPHY - TREBIC, 2010, 47 : 81 - 97
  • [2] Analysis and Formal Security Verification of Access Control Schemes in Wireless Sensor Networks: A Critical Survey
    Chatterjee, Santanu
    Das, Ashok Kumar
    Sing, Jamuna Kanta
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2013, 8 (01): : 33 - 57
  • [3] A Review of Automated Formal Verification of Ad Hoc Routing Protocols for Wireless Sensor Networks
    Chen, Zhe
    Zhang, Daqiang
    Zhu, Rongbo
    Ma, Yinxue
    Yin, Ping
    Xie, Feng
    SENSOR LETTERS, 2013, 11 (05) : 752 - 764
  • [4] Formal Study of Routing Protocols for Wireless Sensor Networks
    Antonio Mateo, Jose
    del Carmen Ruiz, Maria
    Macia, Hermenegilda
    Jose Pardo, Juan
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2014, 20 (09) : 1373 - 1401
  • [5] A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks
    Bernardeschi, Cinzia
    Dini, Gianluca
    Palmieri, Maurizio
    Racciatti, Francesco
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2021, 17 (03) : 249 - 263
  • [6] Energy Efficient Security Protocols for Wireless Sensor Networks : SPINS vs TinySec
    Mbarek, Bacem
    Meddeb, Aref
    2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2016,
  • [7] A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks
    Cinzia Bernardeschi
    Gianluca Dini
    Maurizio Palmieri
    Francesco Racciatti
    Journal of Computer Virology and Hacking Techniques, 2021, 17 : 249 - 263
  • [8] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [9] Firewalling Wireless Sensor Networks: Security by Wireless
    Martinovic, Ivan
    Gollan, Nicos
    Schmitt, Jens B.
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 753 - 760
  • [10] Wireless Sensor Networks: Routing Protocols and Security Issues
    Anjali
    Shikha
    Sharma, Mohit
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,