Inicio  /  Computers  /  Vol: 4 Par: 3 (2015)  /  Artículo
ARTÍCULO
TITULO

Security Property Validation of the Sensor Network Encryption Protocol (SNEP)

Salekul Islam    

Resumen

Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS) is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP) and the ?micro? version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA), named µTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios?node to node key agreement and counter exchange protocols?followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack.

 Artículos similares

       
 
Yang Liu, Xiaotian Qi, Yingxia Wei and Mingna Wang    
To mitigate the incidence of waterlogging to livelihoods and property security, a combination of management measures has been necessary to achieve optimal benefits, reducing the risk caused by waterlogging to the development of the urban ecology. Thus, t... ver más
Revista: Water

 
Zahra Ebadi Ansaroudi, Rocco Zaccagnino and Paolo D?Arco    
Pseudorandomness is a crucial property that the designers of cryptographic primitives aim to achieve. It is also a key requirement in the calls for proposals of new primitives, as in the case of block ciphers. Therefore, the assessment of the property is... ver más
Revista: Applied Sciences

 
Rafik Hamza and Hilmil Pradana    
Big Data applications have the potential to transform any digital business platform by enabling the analysis of vast amounts of data. However, the biggest problem with Big Data is breaking down the intellectual property barriers to using that data, espec... ver más
Revista: Algorithms

 
Jiafu Liu, Zhiyuan Yao, Shirui Guo, Hongjun Xie and Genke Yang    
Image classification is widely used in industrial defect detection, medical diagnosis, social welfare, and other fields, in which privacy and security of models and data must be involved. For example, in diamond synthesis, the diamond substrate image ann... ver más
Revista: Applied Sciences

 
Liliya Akhmetzyanova,Evgeny Alekseev,Alexandra Babueva,Andrey Bozhko,Stanislav Smyshlyaev     Pág. 6 - 14
We introduce a new AEAD mode ? an MGM2 mode. For this mode we provide security bounds regarding extended security notions in the nonce-misuse setting. Misuseresistance is crucial for applications for which there is no way to provide u... ver más