Security in Wireless Sensor Networks: A formal verification of protocols

被引:0
|
作者
Nandi, Giann Spilere [1 ]
Pereira, David [1 ]
Vigil, Martin [2 ]
Moraes, Ricardo [2 ]
Morales, Analucia Schiaffino [2 ]
Araujo, Gustavo [2 ]
机构
[1] CISTER Res Ctr Real Time & Embedded Comp Syst, Porto, Portugal
[2] Univ Fed Santa Catarina, Florianopolis, SC, Brazil
来源
2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN) | 2019年
关键词
Wireless Sensor Networks; Security; Formal Verification; AUTHENTICATION; INTERNET; THINGS;
D O I
10.1109/indin41052.2019.8972080
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The increase of the digitalization taking place in various industrial domains is leading developers towards the design and implementation of more and more complex networked control systems (NCS) supported by Wireless Sensor Networks (WSN). This naturally raises new challenges for the current WSN technology, namely in what concerns improved guarantees of technical aspects such as real-time communications together with safe and secure transmissions. Notably, in what concerns security aspects, several cryptographic protocols have been proposed. Since the design of these protocols is usually error-prone, security breaches can still be exposed and maliciously exploited unless they are rigorously analyzed and verified. In this paper we formally verify, using ProVerif, three cryptographic protocols used in WSN, regarding the security properties of secrecy and authenticity. The security analysis performed in this paper is more robust than the ones performed in related work. Our contributions involve analyzing protocols that were modeled considering an unbounded number of participants and actions, and also the use of a hierarchical system to classify the authenticity results. Our verification shows that the three analyzed protocols guarantee secrecy, but can only provide authenticity in specific scenarios.
引用
收藏
页码:425 / 431
页数:7
相关论文
共 50 条
  • [31] Security for Wireless Sensor Networks: A Review
    Healy, Michael
    Newe, Thomas
    Lewis, Elfed
    SAS 2009 - IEEE SENSORS APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2009, : 80 - 85
  • [32] Security perspective of wireless sensor networks
    Gutierrez-Portela, Fernando
    Almenarez-Mendoza, Florina
    Calderon-Benavides, Liliana
    Romero-Riano, Efren
    UIS INGENIERIAS, 2021, 20 (03): : 189 - 201
  • [33] Security framework for wireless sensor networks
    Prasad N.R.
    Alam M.
    Wireless Personal Communications, 2006, 37 (3-4) : 455 - 469
  • [34] A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards
    Henzl, Martin
    Hanacek, Petr
    RADIOENGINEERING, 2016, 25 (01) : 132 - 139
  • [35] A formal methodology for integral security design and verification of network protocols
    Diaz, Jesus
    Arroyo, David
    Rodriguez, Francisco B.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 89 : 87 - 98
  • [36] A secure handover protocol design in wireless networks with formal verification
    Lim, Sun-Hee
    Bang, Ki-Seok
    Yi, Okyeon
    Lim, Jongin
    WIRED/WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2007, 4517 : 67 - +
  • [37] Formal Verification of the Coordinated Robust Authenticaion Protocol for Wireless Networks
    Ramezani, Khosrow
    Sithirasenan, Elankayer
    Muthukkumarasamy, Vallipuram
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1735 - 1740
  • [38] Security in Wireless Sensor Networks
    Aranzazu Suescun, Catalina
    SISTEMAS & TELEMATICA, 2009, 7 (13): : 43 - 73
  • [39] Towards the Formal Performance Analysis of Wireless Sensor Networks
    Elleuch, Maissa
    Hasan, Osman
    Tahar, Sofiene
    Abid, Mohamed
    2013 IEEE 22ND INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2013, : 365 - 370
  • [40] Security in wireless sensor networks
    Giruka, Venkata C.
    Singhal, Mukesh
    Royalty, James
    Varanasi, Srilekha
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01) : 1 - 24