Advertisement

Telecommunication Systems

, Volume 40, Issue 3–4, pp 91–99 | Cite as

Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK

  • Llanos TobarraEmail author
  • Diego Cazorla
  • Fernando Cuartero
  • Gregorio Díaz
  • Emilia Cambronero
Article

Abstract

In this paper, a formal analysis of security protocols in the field of wireless sensor networks is presented. Three complementary protocols, TinySec, LEAP and TinyPK, are modelled using the high-level formal language HLPSL, and verified using the model checking tool AVISPA, where two main security properties are checked: authenticity and confidentiality of messages. As a result of this analysis, two attacks have been found: a man-in-the-middle-attack and a type flaw attack. In both cases confidentiality is compromised and an intruder may obtain confidential data from a node in the network. Two solutions to these attacks are proposed in the paper.

Keywords

Wireless sensor Model checking Security protocols AVISPA toolbox 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Armando, A., Basin, D. A., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P. H., Héam, P. C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., & Vigneron, L. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In K. Etessami & S. K. Rajamani (Eds.), Lecture notes in computer science : Vol. 3576. CAV (pp. 281–285). Berlin: Springer. Google Scholar
  2. 2.
    Backes, M., Mödersheim, S., Pfitzmann, B., & Viganò, L. (2006). Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. In L. Aceto & A. Ingólfsdóttir (Eds.), Lecture notes in computer science : Vol. 3921. FoSSaCS (pp. 428–445). Berlin: Springer. Google Scholar
  3. 3.
    Bellare, M., Desai, A., Jokipii, E., & Rogaway, P. (1997). A concrete security treatment of symmetric encryption. In Proceedings of 38th annual symposium on foundations of computer science (pp. 394–403). New York: IEEE. CrossRefGoogle Scholar
  4. 4.
    Bellare, M., Kilian, J., & Rogaway, P. (2000). The security of the cipher block chaining message authentication code. Journal of Computer and Systems Sciences, 61(3), 362–399. CrossRefGoogle Scholar
  5. 5.
    Bhargavan, K., Fournet, C., & Gordon, A. D. (2004). Verifying policy-based security for web services. In V. Atluri, B. Pfitzmann, & P. D. McDaniel (Eds.), ACM conference on computer and communications security (pp. 268–277). New York: Assoc. Comput. Mach. Google Scholar
  6. 6.
    Chan, H., Perrig, A., & Song, D. X. (2003). Random key predistribution schemes for sensor networks. In IEEE symposium on security and privacy (p. 197). Los Alamitos: IEEE Comput. Soc. Google Scholar
  7. 7.
    Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P. H., Mantovani, J., Mödersheim, S., & Vigneron, L. (2004) A high level protocol specification language for industrial security-sensitive protocols. In Proceedings of workshop on specification and automated processing of security requirements (SAPS) (pp. 193–205). Google Scholar
  8. 8.
    Clarke, E. M., Grumberg, O., & Peled, D. A. (1999). Model checking. Cambridge: MIT Press. Google Scholar
  9. 9.
    Dolev, D., & Yao, A. C. C. (1981). On the security of public key protocols. In FOCS (pp. 350–357). New York: IEEE. Google Scholar
  10. 10.
    Eschenauer, L., & Gligor, V. (2002). A key-management scheme for distributed sensor networks. In V. Atluri (Ed.), ACM conference on computer and communications security (pp. 41–47). New York: Assoc. Comput. Mach. Google Scholar
  11. 11.
    Glouche, Y., Genet, T., Heen, O., & Courtay, O. (2006). A security protocol animator tool for AVISPA. In ARTIST2 workshop on security specification and verification of embedded systems, Pisa. Google Scholar
  12. 12.
    Heather, J., Lowe, G., & Schneider, S. (2003). How to prevent type flaw attacks on security protocols. Journal of Computer Security, 11(2), 217–244. Google Scholar
  13. 13.
    Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D. E., & Pister, K. S. J. (2000). System architecture directions for networked sensors. In Inter. conf. on architectural support for programming languages and operating systems, ASPLOS (pp. 93–104). Google Scholar
  14. 14.
    Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys 2004 (pp. 162–175). Baltimore, MD, USA, November 3–5, 2004. New York: Assoc. Comput. Mach. CrossRefGoogle Scholar
  15. 15.
    Lowe, G. (1998). Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(1–2), 53–84. Google Scholar
  16. 16.
    Mitchell, J. C. (1998). Finite-state analysis of security protocols. In A. J. Hu & M. Y. Vardi (Eds.), Lecture notes in computer science : Vol. 1427. CAV (pp. 71–76). Berlin: Springer. Google Scholar
  17. 17.
    Perrig, A., Stankovic, J. A., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53–57. CrossRefGoogle Scholar
  18. 18.
    Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534. CrossRefGoogle Scholar
  19. 19.
    Tobarra, M. L., Cazorla, D., Cuartero, F., & Diaz, G. (2005). Application of formal methods to the analysis of web services security. In M. Bravetti, L. Kloul, & G. Zavattaro (Eds.), Lecture notes in computer science : Vol. 3670. EPEW/WS-FM (pp. 215–229). Berlin: Springer. Google Scholar
  20. 20.
    Tobarra, M. L., Cazorla, D., Cuartero, F., & Diaz, G. (2006). Formal verification of TLS handshake and extensions for wireless networks. In Proc. of IADIS international conference on applied computing (AC’06) (pp. 57–64). San Sebastian: IADIS. Google Scholar
  21. 21.
    Watro, R., Kong, D., Cuti, S. F., Gardiner, C., Lynn, C., & Kruus, P. (2004). Tinypk: securing sensor networks with public key technology. In SASN’04: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (pp. 59–64). New York: Assoc. Comput. Mach. doi: 10.1145/1029102.1029113, http://portal.acm.org/citation.cfm?id=1029113. CrossRefGoogle Scholar
  22. 22.
    Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In S. Jajodia, V. Atluri, & T. Jaeger (Eds.), ACM conference on computer and communications security (pp. 62–72). New York: Assoc. Comput. Mach. CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Llanos Tobarra
    • 1
    Email author
  • Diego Cazorla
    • 1
  • Fernando Cuartero
    • 1
  • Gregorio Díaz
    • 1
  • Emilia Cambronero
    • 1
  1. 1.Instituto de Investigación en InformáticaUniversidad de Castilla-La ManchaAlbaceteSpain

Personalised recommendations