Abstract
In this paper, we address the problem of formal security verification of transport protocols for wireless sensor networks (WSN) that perform cryptographic operations. Analyzing this class of protocols is a difficult task because they typically consist of complex behavioral characteristics, such as launching timers, performing probabilistic behavior, and cryptographic operations. Some of the recently published WSN transport protocols are DTSN, which does not include cryptographic security mechanism, and two of its secured versions, SDTP and STWSN. In our previous work, we formally analyzed the security of Distributed Transport for Sensor Networks (DTSN) and Distributed Transport Protocol for Wireless Sensor Networks (SDTP), and showed that they are vulnerable against packet modification attacks. In another work we proposed a new Secure Transport Protocol for WSNs (STWSN), with the goal of eliminating the vulnerability of DTSN and SDTP, however, its security properties have only been informally argued. In this paper, we apply formal method to analyze the security of STWSN.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Dvir, A., ButtyĆ”n, L., Ta, V.-T.: SDTP+: Securing a distributed transport protocol for wsns using merkle trees and hash chains. In: IEEE International Confenrence on Communications (ICC), Budapest, Hungary, pp. 1ā6 (June 2013)
Yicka, J., Mukherjeea, B., Ghosal, D.: Wireless sensor network survey. Computer NetworksĀ 52(12), 2292ā2330 (2008)
Wang, C., Sohraby, K., Li, B., Daneshmand, M., Hu, Y.: A survey of transport protocols for wireless sensor networks. NetworkĀ 20(3), 34ā40 (2006)
ButtyĆ”n, L., Csik, L.: Security analysis of reliable transport layer protocols for wireless sensor networks. In: IEEE Workshop on Sensor Networks and Systems for Pervasive Computing, Mannheim, Germany, pp. 1ā6 (March 2010)
Marchi, B., Grilo, A., Nunes, M.: DTSN - distributed transport for sensor networks. In: IEEE Symposium on Computers and Communications, Aveiro, Portugal, pp. 165ā172 (July 2007)
ButtyĆ”n, L., Grilo, A.M.: A Secure Distributed Transport Protocol for Wireless Sensor Networks. In: IEEE International Conference on Communications, Kyoto, Japan, pp. 1ā6 (June 2011)
Ta, V.-T., Dvir, A.: On formal and automatic security verification of wsn transport protocols. ISRN Sensor Networks (December 2013) (accepted)
Merkle, R.C.: Protocols for Public Key Cryptosystems. In: Symposium on Security and Privacy, California, USA, pp. 122ā134 (April 1980)
Coppersmith, D., Jakobsson, M.: Almost optimal hash sequence traversal. In: Blaze, M. (ed.) FC 2002. LNCS, vol.Ā 2357, pp. 102ā119. Springer, Heidelberg (2003)
Galuba, W., Papadimitratos, P., Poturalski, M., Aberer, K., Despotovic, Z., Kellerer, W.: Castor: Scalable Secure Routing for Ad-Hoc Networks. In: Infocom, Rio de Janeiro, Brazil, pp. 1ā9 (2010)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks JournalĀ 11(1-2), 21ā38 (2005)
Fournet, C., Abadi, M.: Mobile values, new names, and secure communication. In: ACM Symposium on Principles of Programming, pp. 104ā115 (2001)
Goubault-Larrecq, J., Palamidessi, C., Troina, A.: A probabilistic applied piācalculus. In: Shao, Z. (ed.) APLAS 2007. LNCS, vol.Ā 4807, pp. 175ā190. Springer, Heidelberg (2007)
DāArgenio, P.R., Brinksma, E.: A calculus for timed automata. In: Jonsson, B., Parrow, J. (eds.) FTRTFT 1996. LNCS, vol.Ā 1135, pp. 110ā129. Springer, Heidelberg (1996)
Ta, V.-T., Dvir, A.: On formal and automatic security verification of wsn transport protocols. Cryptology ePrint Archive, Report 2013/014 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Ta, VT., Dvir, A., ButtyƔn, L. (2014). Formal Security Verification of Transport Protocols for Wireless Sensor Networks. In: van Do, T., Thi, H., Nguyen, N. (eds) Advanced Computational Methods for Knowledge Engineering. Advances in Intelligent Systems and Computing, vol 282. Springer, Cham. https://doi.org/10.1007/978-3-319-06569-4_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-06569-4_29
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06568-7
Online ISBN: 978-3-319-06569-4
eBook Packages: EngineeringEngineering (R0)