Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Formal Security Verification of Transport Protocols for Wireless Sensor Networks

  • Conference paper
Advanced Computational Methods for Knowledge Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 282))

  • 1574 Accesses

Abstract

In this paper, we address the problem of formal security verification of transport protocols for wireless sensor networks (WSN) that perform cryptographic operations. Analyzing this class of protocols is a difficult task because they typically consist of complex behavioral characteristics, such as launching timers, performing probabilistic behavior, and cryptographic operations. Some of the recently published WSN transport protocols are DTSN, which does not include cryptographic security mechanism, and two of its secured versions, SDTP and STWSN. In our previous work, we formally analyzed the security of Distributed Transport for Sensor Networks (DTSN) and Distributed Transport Protocol for Wireless Sensor Networks (SDTP), and showed that they are vulnerable against packet modification attacks. In another work we proposed a new Secure Transport Protocol for WSNs (STWSN), with the goal of eliminating the vulnerability of DTSN and SDTP, however, its security properties have only been informally argued. In this paper, we apply formal method to analyze the security of STWSN.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Dvir, A., ButtyĆ”n, L., Ta, V.-T.: SDTP+: Securing a distributed transport protocol for wsns using merkle trees and hash chains. In: IEEE International Confenrence on Communications (ICC), Budapest, Hungary, pp. 1ā€“6 (June 2013)

    Google ScholarĀ 

  2. Yicka, J., Mukherjeea, B., Ghosal, D.: Wireless sensor network survey. Computer NetworksĀ 52(12), 2292ā€“2330 (2008)

    ArticleĀ  Google ScholarĀ 

  3. Wang, C., Sohraby, K., Li, B., Daneshmand, M., Hu, Y.: A survey of transport protocols for wireless sensor networks. NetworkĀ 20(3), 34ā€“40 (2006)

    Google ScholarĀ 

  4. ButtyĆ”n, L., Csik, L.: Security analysis of reliable transport layer protocols for wireless sensor networks. In: IEEE Workshop on Sensor Networks and Systems for Pervasive Computing, Mannheim, Germany, pp. 1ā€“6 (March 2010)

    Google ScholarĀ 

  5. Marchi, B., Grilo, A., Nunes, M.: DTSN - distributed transport for sensor networks. In: IEEE Symposium on Computers and Communications, Aveiro, Portugal, pp. 165ā€“172 (July 2007)

    Google ScholarĀ 

  6. ButtyĆ”n, L., Grilo, A.M.: A Secure Distributed Transport Protocol for Wireless Sensor Networks. In: IEEE International Conference on Communications, Kyoto, Japan, pp. 1ā€“6 (June 2011)

    Google ScholarĀ 

  7. Ta, V.-T., Dvir, A.: On formal and automatic security verification of wsn transport protocols. ISRN Sensor Networks (December 2013) (accepted)

    Google ScholarĀ 

  8. Merkle, R.C.: Protocols for Public Key Cryptosystems. In: Symposium on Security and Privacy, California, USA, pp. 122ā€“134 (April 1980)

    Google ScholarĀ 

  9. Coppersmith, D., Jakobsson, M.: Almost optimal hash sequence traversal. In: Blaze, M. (ed.) FC 2002. LNCS, vol.Ā 2357, pp. 102ā€“119. Springer, Heidelberg (2003)

    ChapterĀ  Google ScholarĀ 

  10. Galuba, W., Papadimitratos, P., Poturalski, M., Aberer, K., Despotovic, Z., Kellerer, W.: Castor: Scalable Secure Routing for Ad-Hoc Networks. In: Infocom, Rio de Janeiro, Brazil, pp. 1ā€“9 (2010)

    Google ScholarĀ 

  11. Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks JournalĀ 11(1-2), 21ā€“38 (2005)

    ArticleĀ  Google ScholarĀ 

  12. Fournet, C., Abadi, M.: Mobile values, new names, and secure communication. In: ACM Symposium on Principles of Programming, pp. 104ā€“115 (2001)

    Google ScholarĀ 

  13. Goubault-Larrecq, J., Palamidessi, C., Troina, A.: A probabilistic applied piā€“calculus. In: Shao, Z. (ed.) APLAS 2007. LNCS, vol.Ā 4807, pp. 175ā€“190. Springer, Heidelberg (2007)

    ChapterĀ  Google ScholarĀ 

  14. Dā€™Argenio, P.R., Brinksma, E.: A calculus for timed automata. In: Jonsson, B., Parrow, J. (eds.) FTRTFT 1996. LNCS, vol.Ā 1135, pp. 110ā€“129. Springer, Heidelberg (1996)

    ChapterĀ  Google ScholarĀ 

  15. Ta, V.-T., Dvir, A.: On formal and automatic security verification of wsn transport protocols. Cryptology ePrint Archive, Report 2013/014 (2013)

    Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vinh-Thong Ta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Ta, VT., Dvir, A., ButtyƔn, L. (2014). Formal Security Verification of Transport Protocols for Wireless Sensor Networks. In: van Do, T., Thi, H., Nguyen, N. (eds) Advanced Computational Methods for Knowledge Engineering. Advances in Intelligent Systems and Computing, vol 282. Springer, Cham. https://doi.org/10.1007/978-3-319-06569-4_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06569-4_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06568-7

  • Online ISBN: 978-3-319-06569-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics