A Semantic Analysis of Wireless Network Security Protocols

  • Damiano Macedonio
  • Massimo Merro
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7226)


Gorrieri and Martinelli’s tGNDC is a general framework for the formal verification of security protocols in a concurrent scenario. We generalise their tGNDC schema to verify wireless network security protocols. Our generalisation relies on a simple timed broadcasting process calculus whose operational semantics is given in terms of a labelled transition system which is used to derive a standard simulation theory. We apply our tGNDC schema to perform a security analysis of LiSP, a well-known key management protocol for wireless sensor networks.


Sensor Node Wireless Sensor Network Time Slot Security Analysis Operational Semantic 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ballardin, F., Merro, M.: A Calculus for the Analysis of Wireless Network Security Protocols. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 206–222. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  2. 2.
    Bertot, Y.: A Short Presentation of Coq. In: Mohamed, O.A., Muñoz, C., Tahar, S. (eds.) TPHOLs 2008. LNCS, vol. 5170, pp. 12–16. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  3. 3.
    Ghassemi, F., Fokkink, W., Movaghar, A.: Equational Reasoning on Ad Hoc Networks. In: Arbab, F., Sirjani, M. (eds.) FSEN 2009. LNCS, vol. 5961, pp. 113–128. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  4. 4.
    Godskesen, J.C.: A Calculus for Mobile Ad Hoc Networks. In: Murphy, A.L., Ryan, M. (eds.) COORDINATION 2007. LNCS, vol. 4467, pp. 132–150. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Gorrieri, R., Martinelli, F.: A simple framework for real-time cryptographic protocol analysis with compositional proof rules. Science of Computer Programming 50(1-3), 23–49 (2004)MathSciNetzbMATHCrossRefGoogle Scholar
  6. 6.
    Gorrieri, R., Martinelli, F., Petrocchi, M.: Formal models and analysis of secure multicast in wired and wireless networks. Journal of Automated Reasoning 41(3-4), 325–364 (2008)zbMATHCrossRefGoogle Scholar
  7. 7.
    Hennessy, M., Regan, T.: A Process Algebra for Timed Systems. Information and Computation 117(2), 221–239 (1995)MathSciNetzbMATHCrossRefGoogle Scholar
  8. 8.
    Lanese, I., Sangiorgi, D.: An Operational Semantics for a Calculus for Wireless Systems. Theoretical Computer Science 411, 1928–1948 (2010)MathSciNetzbMATHCrossRefGoogle Scholar
  9. 9.
    Merro, M.: An Observational Theory for Mobile Ad Hoc Networks (full paper). Information and Computation 207(2), 194–208 (2009)MathSciNetzbMATHCrossRefGoogle Scholar
  10. 10.
    Merro, M., Sibilio, E.: A Timed Calculus for Wireless Systems. In: Arbab, F., Sirjani, M. (eds.) FSEN 2009. LNCS, vol. 5961, pp. 228–243. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  11. 11.
    Misra, S., Woungag, I.: Guide to Wireless Ad Hoc Networks. Computer Communications and Networks. Springer, London (2009)CrossRefGoogle Scholar
  12. 12.
    Nanz, S., Hankin, C.: A Framework for Security Analysis of Mobile Wireless Networks. Theoretical Computer Science 367(1-2), 203–227 (2006)MathSciNetzbMATHCrossRefGoogle Scholar
  13. 13.
    Nipkow, T., Paulson, L.C., Wenzel, M.: Isabelle/HOL - A Proof Assistant for Higher-Order Logic. LNCS, vol. 2283. Springer, Heidelberg (2002)zbMATHGoogle Scholar
  14. 14.
    Park, T., Shin, K.G.: LiSP: A lightweight security protocol for wireless sensor networks. ACM Transactions in Embedded Computing Systems 3(3), 634–660 (2004)CrossRefGoogle Scholar
  15. 15.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)zbMATHCrossRefGoogle Scholar
  16. 16.
    Singh, A., Ramakrishnan, C.R., Smolka, S.A.: A process calculus for mobile ad hoc networks. Science of Computer Programming 75(6), 440–469 (2010)MathSciNetzbMATHCrossRefGoogle Scholar
  17. 17.
    Zhu, S., Setia, S., Jajodia, S.: Leap+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. on Sensor Networks 2(4), 500–528 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Damiano Macedonio
    • 1
  • Massimo Merro
    • 1
  1. 1.Dipartimento di InformaticaUniversità degli Studi di VeronaItaly

Personalised recommendations