Facebook Instagram Twitter RSS Feed PodBean Back to top on side

Formal analysis of security protocols for wireless sensor networks

In: Tatra Mountains Mathematical Publications, vol. 47, no. 3
Marián Novotný

Details:

Year, pages: 2010, 81 - 97
Keywords:
security protocols, Wireless Sensor Networks, formal analysis, Dolev-Yao model of the attacker, data integrity, the applied pi-calculus
About article:
Design of security protocols is notoriously error-prone. For this reason, it is required to use formal methods to analyze their security properties. In the paper we present a formal analysis of the Canvas protocol. The Canvas protocol was developed by Harald Vogt and should provide data integrity in Wireless Sensor Networks. However, Dieter Gollmann published an attack on the protocol. We consider the fallacy of the Canvas scheme in different models of the attacker and present a solution for correcting the scheme. We propose a formal model of the fixed Canvas protocol in the applied pi-calculus. This model includes a model of the network topology, communication channels, captured nodes, and capabilities of the attacker. Moreover, we formulate and analyze the data integrity property of the scheme in the semantic model of the applied pi-calculus. We prove that the fixed Canvas scheme, in the presence of an active adversary, provides data integrity of messages assuming that captured nodes are not direct neighbors in the communication graph of a sensor network. Finally, we discuss the applicability of the proposed formal model for analysis of other WSN security protocols.
How to cite:
ISO 690:
Novotný, M. 2010. Formal analysis of security protocols for wireless sensor networks. In Tatra Mountains Mathematical Publications, vol. 47, no.3, pp. 81-97. 1210-3195.

APA:
Novotný, M. (2010). Formal analysis of security protocols for wireless sensor networks. Tatra Mountains Mathematical Publications, 47(3), 81-97. 1210-3195.