Security in Wireless Sensor Networks: A formal verification of protocols

被引:0
|
作者
Nandi, Giann Spilere [1 ]
Pereira, David [1 ]
Vigil, Martin [2 ]
Moraes, Ricardo [2 ]
Morales, Analucia Schiaffino [2 ]
Araujo, Gustavo [2 ]
机构
[1] CISTER Res Ctr Real Time & Embedded Comp Syst, Porto, Portugal
[2] Univ Fed Santa Catarina, Florianopolis, SC, Brazil
来源
2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN) | 2019年
关键词
Wireless Sensor Networks; Security; Formal Verification; AUTHENTICATION; INTERNET; THINGS;
D O I
10.1109/indin41052.2019.8972080
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increase of the digitalization taking place in various industrial domains is leading developers towards the design and implementation of more and more complex networked control systems (NCS) supported by Wireless Sensor Networks (WSN). This naturally raises new challenges for the current WSN technology, namely in what concerns improved guarantees of technical aspects such as real-time communications together with safe and secure transmissions. Notably, in what concerns security aspects, several cryptographic protocols have been proposed. Since the design of these protocols is usually error-prone, security breaches can still be exposed and maliciously exploited unless they are rigorously analyzed and verified. In this paper we formally verify, using ProVerif, three cryptographic protocols used in WSN, regarding the security properties of secrecy and authenticity. The security analysis performed in this paper is more robust than the ones performed in related work. Our contributions involve analyzing protocols that were modeled considering an unbounded number of participants and actions, and also the use of a hierarchical system to classify the authenticity results. Our verification shows that the three analyzed protocols guarantee secrecy, but can only provide authenticity in specific scenarios.
引用
收藏
页码:425 / 431
页数:7
相关论文
共 50 条
  • [21] Formal verification: an imperative step in the design of security protocols
    Coffey, T
    Dojen, R
    Flanagan, T
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 43 (05): : 601 - 618
  • [22] A Formal Specification and Verification Framework for Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Sun, Meng
    Dong, Jin-Song
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 44 (08) : 725 - 746
  • [23] Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues
    Ahmad, Rami
    Wazirali, Raniyah
    Abu-Ain, Tarik
    SENSORS, 2022, 22 (13)
  • [24] A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols
    Tomic, Ivana
    McCann, Julie A.
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 1910 - 1923
  • [25] Practical Access Control Protocols (PACPs) for Wireless Sensor Networks: Analysis of Security Pitfalls
    Sain, Mangal
    Kim, Hyun Ho
    Lee, Hoon Jae
    2017 19TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - OPENING NEW ERA OF SMART SOCIETY, 2017, : 822 - 826
  • [26] Research on Security of Wireless Sensor Networks
    Li, Hongli
    Sun, Huiqin
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 109 - 114
  • [27] A Security Scheme for Wireless Sensor Networks
    Fouchal, Hacene
    Biesa, Javier
    Romero, Elena
    Araujo, Alvaro
    Taladrez, Octavio Nieto
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [28] Security Mechanisms for Wireless Sensor Networks
    Ren, Xiuli
    Yul, Haibin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B): : 155 - 161
  • [29] Security methods for wireless sensor networks
    Ren, Xiuli
    IEEE ICMA 2006: Proceeding of the 2006 IEEE International Conference on Mechatronics and Automation, Vols 1-3, Proceedings, 2006, : 1925 - 1930
  • [30] Formal Verification of Mobile Agent Based Anomaly Detection in Wireless Sensor Networks
    Usman, Muhammad
    Muthukkumarasamy, Vallipuram
    Wu, Xin-Wen
    PROCEEDINGS OF THE 2013 38TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS), 2013, : 1001 - 1009