Formal security verification of transport protocols for wireless sensor networks

Vinh Thong Ta, Amit Dvir, Levente Buttyán

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we address the problem of formal security verification of transport protocols for wireless sensor networks (WSN) that perform cryptographic operations. Analyzing this class of protocols is a difficult task because they typically consist of complex behavioral characteristics, such as launching timers, performing probabilistic behavior, and cryptographic operations. Some of the recently published WSN transport protocols are DTSN, which does not include cryptographic security mechanism, and two of its secured versions, SDTP and STWSN1. In our previous work, we formally analyzed the security of Distributed Transport for Sensor Networks (DTSN) and Distributed Transport Protocol for Wireless Sensor Networks (SDTP), and showed that they are vulnerable against packet modification attacks. In another work we proposed a new Secure Transport Protocol for WSNs (STWSN), with the goal of eliminating the vulnerability of DTSN and SDTP, however, its security properties have only been informally argued. In this paper, we apply formal method to analyze the security of STWSN.

Original languageEnglish
Title of host publicationAdvanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014
EditorsNgoc Thanh Nguyen, Hoai An Le Thi, Tien Van Do
PublisherSpringer Verlag
Pages389-403
Number of pages15
ISBN (Electronic)9783319065687
DOIs
StatePublished - 1 Jan 2014
Externally publishedYes
Event2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014 - Budapest, Hungary
Duration: 8 May 20139 May 2013

Publication series

NameAdvances in Intelligent Systems and Computing
Volume282
ISSN (Print)2194-5357

Conference

Conference2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014
Country/TerritoryHungary
CityBudapest
Period8/05/139/05/13

ASJC Scopus subject areas

  • Control and Systems Engineering
  • General Computer Science

Fingerprint

Dive into the research topics of 'Formal security verification of transport protocols for wireless sensor networks'. Together they form a unique fingerprint.

Cite this