Formal security verification of transport protocols for wireless sensor networks

Vinh Thong Ta, Amit Dvir, L. Buttyán

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

In this paper, we address the problem of formal security verification of transport protocols for wireless sensor networks (WSN) that perform cryptographic operations. Analyzing this class of protocols is a difficult task because they typically consist of complex behavioral characteristics, such as launching timers, performing probabilistic behavior, and cryptographic operations. Some of the recently published WSN transport protocols are DTSN, which does not include cryptographic security mechanism, and two of its secured versions, SDTP and STWSN1. In our previous work, we formally analyzed the security of Distributed Transport for Sensor Networks (DTSN) and Distributed Transport Protocol for Wireless Sensor Networks (SDTP), and showed that they are vulnerable against packet modification attacks. In another work we proposed a new Secure Transport Protocol for WSNs (STWSN), with the goal of eliminating the vulnerability of DTSN and SDTP, however, its security properties have only been informally argued. In this paper, we apply formal method to analyze the security of STWSN.

Original languageEnglish
Title of host publicationAdvanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014
PublisherSpringer Verlag
Pages389-403
Number of pages15
Volume282
ISBN (Print)9783319065687
DOIs
Publication statusPublished - 2014
Event2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014 - Budapest, Hungary
Duration: May 8 2013May 9 2013

Publication series

NameAdvances in Intelligent Systems and Computing
Volume282
ISSN (Print)21945357

Other

Other2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014
CountryHungary
CityBudapest
Period5/8/135/9/13

Fingerprint

Wireless sensor networks
Network protocols
Sensor networks
Formal methods
Launching

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)

Cite this

Ta, V. T., Dvir, A., & Buttyán, L. (2014). Formal security verification of transport protocols for wireless sensor networks. In Advanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014 (Vol. 282, pp. 389-403). (Advances in Intelligent Systems and Computing; Vol. 282). Springer Verlag. https://doi.org/10.1007/978-3-319-06569-4_29

Formal security verification of transport protocols for wireless sensor networks. / Ta, Vinh Thong; Dvir, Amit; Buttyán, L.

Advanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014. Vol. 282 Springer Verlag, 2014. p. 389-403 (Advances in Intelligent Systems and Computing; Vol. 282).

Research output: Chapter in Book/Report/Conference proceedingChapter

Ta, VT, Dvir, A & Buttyán, L 2014, Formal security verification of transport protocols for wireless sensor networks. in Advanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014. vol. 282, Advances in Intelligent Systems and Computing, vol. 282, Springer Verlag, pp. 389-403, 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014, Budapest, Hungary, 5/8/13. https://doi.org/10.1007/978-3-319-06569-4_29
Ta VT, Dvir A, Buttyán L. Formal security verification of transport protocols for wireless sensor networks. In Advanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014. Vol. 282. Springer Verlag. 2014. p. 389-403. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-3-319-06569-4_29
Ta, Vinh Thong ; Dvir, Amit ; Buttyán, L. / Formal security verification of transport protocols for wireless sensor networks. Advanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014. Vol. 282 Springer Verlag, 2014. pp. 389-403 (Advances in Intelligent Systems and Computing).
@inbook{ae2c2db9756947768b9bfd4bda362b73,
title = "Formal security verification of transport protocols for wireless sensor networks",
abstract = "In this paper, we address the problem of formal security verification of transport protocols for wireless sensor networks (WSN) that perform cryptographic operations. Analyzing this class of protocols is a difficult task because they typically consist of complex behavioral characteristics, such as launching timers, performing probabilistic behavior, and cryptographic operations. Some of the recently published WSN transport protocols are DTSN, which does not include cryptographic security mechanism, and two of its secured versions, SDTP and STWSN1. In our previous work, we formally analyzed the security of Distributed Transport for Sensor Networks (DTSN) and Distributed Transport Protocol for Wireless Sensor Networks (SDTP), and showed that they are vulnerable against packet modification attacks. In another work we proposed a new Secure Transport Protocol for WSNs (STWSN), with the goal of eliminating the vulnerability of DTSN and SDTP, however, its security properties have only been informally argued. In this paper, we apply formal method to analyze the security of STWSN.",
author = "Ta, {Vinh Thong} and Amit Dvir and L. Butty{\'a}n",
year = "2014",
doi = "10.1007/978-3-319-06569-4_29",
language = "English",
isbn = "9783319065687",
volume = "282",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer Verlag",
pages = "389--403",
booktitle = "Advanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014",

}

TY - CHAP

T1 - Formal security verification of transport protocols for wireless sensor networks

AU - Ta, Vinh Thong

AU - Dvir, Amit

AU - Buttyán, L.

PY - 2014

Y1 - 2014

N2 - In this paper, we address the problem of formal security verification of transport protocols for wireless sensor networks (WSN) that perform cryptographic operations. Analyzing this class of protocols is a difficult task because they typically consist of complex behavioral characteristics, such as launching timers, performing probabilistic behavior, and cryptographic operations. Some of the recently published WSN transport protocols are DTSN, which does not include cryptographic security mechanism, and two of its secured versions, SDTP and STWSN1. In our previous work, we formally analyzed the security of Distributed Transport for Sensor Networks (DTSN) and Distributed Transport Protocol for Wireless Sensor Networks (SDTP), and showed that they are vulnerable against packet modification attacks. In another work we proposed a new Secure Transport Protocol for WSNs (STWSN), with the goal of eliminating the vulnerability of DTSN and SDTP, however, its security properties have only been informally argued. In this paper, we apply formal method to analyze the security of STWSN.

AB - In this paper, we address the problem of formal security verification of transport protocols for wireless sensor networks (WSN) that perform cryptographic operations. Analyzing this class of protocols is a difficult task because they typically consist of complex behavioral characteristics, such as launching timers, performing probabilistic behavior, and cryptographic operations. Some of the recently published WSN transport protocols are DTSN, which does not include cryptographic security mechanism, and two of its secured versions, SDTP and STWSN1. In our previous work, we formally analyzed the security of Distributed Transport for Sensor Networks (DTSN) and Distributed Transport Protocol for Wireless Sensor Networks (SDTP), and showed that they are vulnerable against packet modification attacks. In another work we proposed a new Secure Transport Protocol for WSNs (STWSN), with the goal of eliminating the vulnerability of DTSN and SDTP, however, its security properties have only been informally argued. In this paper, we apply formal method to analyze the security of STWSN.

UR - http://www.scopus.com/inward/record.url?scp=84927601235&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84927601235&partnerID=8YFLogxK

U2 - 10.1007/978-3-319-06569-4_29

DO - 10.1007/978-3-319-06569-4_29

M3 - Chapter

AN - SCOPUS:84927601235

SN - 9783319065687

VL - 282

T3 - Advances in Intelligent Systems and Computing

SP - 389

EP - 403

BT - Advanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014

PB - Springer Verlag

ER -