A semantic analysis of key management protocols for wireless sensor networks

被引:17
作者
Macedonio, Damiano [1 ]
Merro, Massimo [1 ]
机构
[1] Univ Verona, Dipartimento Informat, I-37100 Verona, Italy
关键词
Wireless sensor network; Key management protocol; Security analysis; Process calculus; SECURITY PROTOCOLS; MOBILITY MODELS; CALCULUS; FRAMEWORK; MULTICAST;
D O I
10.1016/j.scico.2013.01.005
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Gorrieri and Martinelli's timed Generalized Non-Deducibility on Compositions (tGNDC) schema is a well-known general framework for the formal verification of security protocols in a concurrent scenario. We generalise the tGNDC schema to verify wireless network security protocols. Our generalisation relies on a simple timed broadcasting process calculus whose operational semantics is given in terms of a labelled transition system which is used to derive a standard simulation theory. We apply our tGNDC framework to perform a security analysis of three well-known key management protocols for wireless sensor networks: mu TESLA, LEAP+ and LiSP. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:53 / 78
页数:26
相关论文
共 43 条
[1]   Key infection: Smart trust for smart dust [J].
Anderson, R ;
Chan, HW ;
Perrig, A .
12TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS, 2004, :206-215
[2]  
[Anonymous], 2004, Proc. 2nd ACM workshop on Security of Ad hoc and Sensor Networks, DOI [DOI 10.1145/1029102.1029113, 10.1145/1029102.1029113]
[3]  
[Anonymous], 2004, P 2 INT C EMB NETW S, DOI DOI 10.1145/1031495.1031515
[4]  
[Anonymous], 1996, Mobile Computing
[5]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[6]   Modeling and Verifying Ad Hoc Routing Protocols [J].
Arnaud, Mathilde ;
Cortier, Veronique ;
Delaune, Stephanie .
2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, :59-74
[7]  
Ballardin F, 2011, LECT NOTES COMPUT SC, V6561, P206, DOI 10.1007/978-3-642-19751-2_14
[8]  
Basagni S., 2001, MOBIHOC 2001. Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, P156, DOI 10.1145/501416.501438
[9]  
Bertot Y, 2008, LECT NOTES COMPUT SC, V5170, P12, DOI 10.1007/978-3-540-71067-7_3
[10]  
Blackshear S., 2010, SAC, P1985