Table of Contents
ISRN Sensor Networks
Volume 2014, Article ID 891467, 20 pages
http://dx.doi.org/10.1155/2014/891467
Research Article

On Formal and Automatic Security Verification of WSN Transport Protocols

1Laboratory of Cryptography and Systems Security (CrySyS), Budapest University of Technology and Economics, Budapest 1117, Hungary
2MTA-BME Information Systems Research Group, Magyar tudósok körútja 2, Budapest 1117, Hungary
3Computer Science Department, College of Management Academic Studies, 7 Yitzhak Rabin Boulevard, 75190 Rishon LeZion, Israel

Received 21 October 2013; Accepted 17 December 2013; Published 4 March 2014

Academic Editors: J. Li, S. Srinivasan, and Y. Yu

Copyright © 2014 Vinh Thong Ta et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. B. Marchi, A. Grilo, and M. Nunes, “DTSN: distributed transport for sensor networks,” in Proceedings of the 12th IEEE International Symposium on Computers and Communications (ISCC '07), pp. 165–172, Aveiro, Portugal, July 2007. View at Publisher · View at Google Scholar · View at Scopus
  3. L. Buttyan and A. M. Grilo, “A secure distributed transport protocol for wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '11), pp. 1–6, Kyoto, Japan, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. L. Buttyan and L. Csik, “Security analysis of reliable transport layer protocols for wireless sensor networks,” in Proceedings of the IEEE Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS '10), pp. 1–6, Mannheim, Germany, March 2010.
  5. M. Abadi and C. Fournet, “Mobile values, new names, and secure communication,” in Proceedings of the 28th ACM Symposium on Principles of Programming (POPL'01), pp. 104–115, January 2001. View at Scopus
  6. J. Goubault-Larrecq, C. Palamidessi, and A. Troina, “A probabilistic applied pi-calculus,” in Programming Languages and Systems, pp. 175–190, Springer, 2007. View at Google Scholar
  7. P. R. D'Argenio and E. Brinksma, “A calculus for timed automata,” Tech. Rep., Theoretical Computer Science, 1996. View at Google Scholar
  8. L. Yang et al., Pat: process analysis toolkit.
  9. T. Dierks and E. Rescorla, “The transport layer security (TLS) protocol version 1. 2,” RFC 5246, Internet Engineering Task Force, 2008. View at Google Scholar
  10. R. Milner, J. Parrow, and D. Walker, “A calculus of mobile processes, parts I and II,” Information and Computation, vol. 100, no. 1, pp. 1–77, 1992. View at Google Scholar
  11. T. V. Thong and A. Dvir, “On formal and automatic security verification of wsn transport protocols,” Tech. Rep. 2013/014, Cryptology Eprint Archive, 2013. View at Google Scholar
  12. R. Lanotte, A. Maggiolo-Schettini, and A. Troina, “Weak bisimulation for prob-abilistic timed automata,” in Proceedings of the International Conference on Software Engineering and Formal Methods (SEFM '03), pp. 34–43, IEEE CS Press, 2003. View at Google Scholar
  13. B. Blanchet, “Automatic proof of strong secrecy for security protocols,” in Proceedings of the 2004 IEEE Symposium on Security and Privacy, pp. 86–100, Oakland, Calif, USA, May 2004. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, “SPINS: security protocols for sensor networks,” in Proceedings of the 7th ACM Annual International Conference on Mobile Computing and Networking (MobiCom '01), pp. 189–199, Rome, Italy, July 2001. View at Scopus
  15. J. Bengtsson and F. Larsson, “Uppaal a tool for automatic verification of real-time systems,” Tech. Rep., Uppsala University, 1996. View at Google Scholar
  16. J. D. Marshall II and X. Yuan, “An analysis of the secure routing protocol for mobile ad hoc network route discovery: Using intuitive reasoning and formal verification to identify flaws,” Tech. Rep., The Florida State University, 2003. View at Google Scholar
  17. M. Kwiatkowska, G. Norman, and D. Parker, “PRISM 4-0: verification of probabilistic realtime systems,” in Proceedings of the 23rd International Conference on Computer Aided Verification (CAV '11), G. Gopalakrishnan and S. Qadeer, Eds., vol. 6806 of Lecture Notes in Computer Science, pp. 585–591, Springer, 2011. View at Google Scholar
  18. C. A. R. Hoare, “Communicating sequential processes,” Communications of the ACM, vol. 21, no. 8, pp. 666–677, 1978. View at Publisher · View at Google Scholar · View at Scopus
  19. G. Holzmann, The Spin Model Checker: Primer and Reference Manual, Addison-Wesley Professional, 1st edition, 2003.