Abstract
Algebraic specification languages are formal methods that provide a rigorous basis for modeling of several systems. Security protocols are safety critical systems that need to be verified before their implementation. In this paper we have formally specified sensor network encryption protocol (SNEP) and a key agreement protocol for sensor networks, both from the SPINS protocol suite, with the OTS/CafeOBJ method, a well known formal specification technique applied not only in research, but also in industry. Based on this specification, we have proved that each protocol possesses an important safety(invariant) property.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bjørner, D.: Logics of Formal Specification Languages - The Possible Worlds cum Domain Problem. In: Proceedings of 4th Panhellenic Symposium on Logic (2003)
Ogata, K., Futatsugi, K.: Proof Scores in the OTS/CafeOBJ Method. In: Najm, E., Nestmann, U., Stevens, P. (eds.) FMOODS 2003. LNCS, vol. 2884, pp. 170–184. Springer, Heidelberg (2003)
Ogata, K., Futatsugi, K.: Some Tips on Writing Proof Scores in the OTS/CafeOBJ Method. In: Futatsugi, K., Jouannaud, J.-P., Meseguer, J. (eds.) Algebra, Meaning, and Computation. LNCS, vol. 4060, pp. 596–615. Springer, Heidelberg (2006)
Diaconescu, R., Futatsugi, K.: CafeOBJ Report. World Scientific, Singapore (1998)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: Proceedings of MOBICOM 2001, pp. 189–199 (2001)
Goguen, J., Malcolm, G.: A hidden agenda. Technical Report CS97-538, University of California at San Diego (1997)
Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inform. Theory IT-29, 198–208 (1983)
Ogata, K., Futatsugi, K.: Rewriting - based verification of authentication protocols. In: WRLA 2002. ENTCS, vol. 71 (2002)
Ogata, K., Futatsugi, K.: Modeling and Verification of Real-Time Systems Based on Equations. Science of computer programming 66(2), 162–180 (2007)
Diaconescu, R., Futatsugi, K., Ogata, K.: CafeOBJ: Logical Foundations and Methodologies. Computing and Informatics 22, 1001–1025 (2003)
Ogata, K., Futatsugi, K.: Formal analysis of Suzuki and Kasami distributed mutual exclusion algorithm. In: FMOODS 2002, pp. 181–195 (2002)
Seino, T., Ogata, K., Futatsugi, K.: Specification and Verification of a Single-Track Railroad Signaling in CafeOBJ. IEICE Trans. Fundamentals E84-A(6), 1471–1478 (2001)
Xiang, J., Kong, W., Futatsugi, K., Ogata, K.: Analysis of Positive Incentives for Protecting Secrets in Digital Rights Management. In: WEBIST 2006 (2006)
Ouranos, I. Stefaneas, P., Frangos, P.: A Formal Specification Framework for ad hoc mobile communication networks. In: van Leeuwen, J., Italiano, G.F., van der Hoek, W., Meinel, C., Sack, H., Plášil, F., Bielikova, M. (eds.) SOFSEM 2007, vol. 2, pp. 91–102, Institute of Computer Science AS CR, Prague (2007) ISBN 80-903298-9-6
Ouranos, I., Stefaneas, P., Frangos, P.: An Algebraic Framework for Modeling of Mobile Systems. IEICE Trans. Fundamentals E90-A(9) (to appear, 2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ouranos, I., Stefaneas, P. (2007). Verifying Security Protocols for Sensor Networks Using Algebraic Specification Techniques. In: Bozapalidis, S., Rahonis, G. (eds) Algebraic Informatics. CAI 2007. Lecture Notes in Computer Science, vol 4728. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75414-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-75414-5_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75413-8
Online ISBN: 978-3-540-75414-5
eBook Packages: Computer ScienceComputer Science (R0)