A Semantic Analysis of Wireless Network Security Protocols

  • Damiano Macedonio
  • Massimo Merro
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7226)

Abstract

Gorrieri and Martinelli’s tGNDC is a general framework for the formal verification of security protocols in a concurrent scenario. We generalise their tGNDC schema to verify wireless network security protocols. Our generalisation relies on a simple timed broadcasting process calculus whose operational semantics is given in terms of a labelled transition system which is used to derive a standard simulation theory. We apply our tGNDC schema to perform a security analysis of LiSP, a well-known key management protocol for wireless sensor networks.

Keywords

Sensor Node Wireless Sensor Network Time Slot Security Analysis Operational Semantic 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ballardin, F., Merro, M.: A Calculus for the Analysis of Wireless Network Security Protocols. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 206–222. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  2. 2.
    Bertot, Y.: A Short Presentation of Coq. In: Mohamed, O.A., Muñoz, C., Tahar, S. (eds.) TPHOLs 2008. LNCS, vol. 5170, pp. 12–16. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  3. 3.
    Ghassemi, F., Fokkink, W., Movaghar, A.: Equational Reasoning on Ad Hoc Networks. In: Arbab, F., Sirjani, M. (eds.) FSEN 2009. LNCS, vol. 5961, pp. 113–128. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  4. 4.
    Godskesen, J.C.: A Calculus for Mobile Ad Hoc Networks. In: Murphy, A.L., Ryan, M. (eds.) COORDINATION 2007. LNCS, vol. 4467, pp. 132–150. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Gorrieri, R., Martinelli, F.: A simple framework for real-time cryptographic protocol analysis with compositional proof rules. Science of Computer Programming 50(1-3), 23–49 (2004)MathSciNetMATHCrossRefGoogle Scholar
  6. 6.
    Gorrieri, R., Martinelli, F., Petrocchi, M.: Formal models and analysis of secure multicast in wired and wireless networks. Journal of Automated Reasoning 41(3-4), 325–364 (2008)MATHCrossRefGoogle Scholar
  7. 7.
    Hennessy, M., Regan, T.: A Process Algebra for Timed Systems. Information and Computation 117(2), 221–239 (1995)MathSciNetMATHCrossRefGoogle Scholar
  8. 8.
    Lanese, I., Sangiorgi, D.: An Operational Semantics for a Calculus for Wireless Systems. Theoretical Computer Science 411, 1928–1948 (2010)MathSciNetMATHCrossRefGoogle Scholar
  9. 9.
    Merro, M.: An Observational Theory for Mobile Ad Hoc Networks (full paper). Information and Computation 207(2), 194–208 (2009)MathSciNetMATHCrossRefGoogle Scholar
  10. 10.
    Merro, M., Sibilio, E.: A Timed Calculus for Wireless Systems. In: Arbab, F., Sirjani, M. (eds.) FSEN 2009. LNCS, vol. 5961, pp. 228–243. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  11. 11.
    Misra, S., Woungag, I.: Guide to Wireless Ad Hoc Networks. Computer Communications and Networks. Springer, London (2009)CrossRefGoogle Scholar
  12. 12.
    Nanz, S., Hankin, C.: A Framework for Security Analysis of Mobile Wireless Networks. Theoretical Computer Science 367(1-2), 203–227 (2006)MathSciNetMATHCrossRefGoogle Scholar
  13. 13.
    Nipkow, T., Paulson, L.C., Wenzel, M.: Isabelle/HOL - A Proof Assistant for Higher-Order Logic. LNCS, vol. 2283. Springer, Heidelberg (2002)MATHGoogle Scholar
  14. 14.
    Park, T., Shin, K.G.: LiSP: A lightweight security protocol for wireless sensor networks. ACM Transactions in Embedded Computing Systems 3(3), 634–660 (2004)CrossRefGoogle Scholar
  15. 15.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)MATHCrossRefGoogle Scholar
  16. 16.
    Singh, A., Ramakrishnan, C.R., Smolka, S.A.: A process calculus for mobile ad hoc networks. Science of Computer Programming 75(6), 440–469 (2010)MathSciNetMATHCrossRefGoogle Scholar
  17. 17.
    Zhu, S., Setia, S., Jajodia, S.: Leap+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. on Sensor Networks 2(4), 500–528 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Damiano Macedonio
    • 1
  • Massimo Merro
    • 1
  1. 1.Dipartimento di InformaticaUniversità degli Studi di VeronaItaly

Personalised recommendations