Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016 (2016), Article ID 8797568, 11 pages
http://dx.doi.org/10.1155/2016/8797568
Research Article

From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

1College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023, China
2College of Computer Science and Technology, Zhejiang University, Hangzhou 310012, China

Received 29 March 2015; Revised 14 July 2015; Accepted 27 July 2015

Academic Editor: Jian-Nong Cao

Copyright © 2016 Tieming Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. Chen, J. Jiang, X. Wang, and B. Chen, “Improved location-based compromise-tolerant security mechanisms for wireless sensor networks,” Chinese Journal of Sensors and Actuators, vol. 25, no. 4, pp. 545–551, 2012. View at Publisher · View at Google Scholar · View at Scopus
  2. G. Lowe, “Breaking and fixing the Needham-Schroeder public-key authentication protocol sing CSP and FDR,” in Proceedings of the 2nd International Workshop on Tools and Algorithms for Construction and Analysis of Systems (TACAS '96), vol. 1055 of Lecture Notes in Computer Science, Springer, 1996. View at Google Scholar
  3. M. Novotný, “Formal analysis of security protocols for wireless sensor networks,” Tatra Mountains Mathematical Publications, vol. 47, no. 1, pp. 81–97, 2010. View at Publisher · View at Google Scholar
  4. P. Ballarini and A. Miller, “Model checking medium access control for sensor networks,” in Proceedings of the 2nd International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA '06), pp. 255–262, IEEE, Paphos, Cyprus, November 2006. View at Publisher · View at Google Scholar
  5. N. Saxena, A. Roy, and J. Shin, “Dynamic duty cycle and adaptive contention window based QoS-MAC protocol for wireless multimedia sensor networks,” Computer Networks, vol. 52, no. 13, pp. 2532–2542, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  6. C. Karlof, N. Sastry, and D. Wagner, “TinySec: a link layer security architecture for wireless sensor networks,” in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04), pp. 162–175, ACM, November 2004. View at Scopus
  7. M. Luk, G. Mezzour, A. Perrig, and V. Gligor, “MiniSec: a secure sensor network communication architecture,” in Proceedings of the 6th International Symposium on Information Processing in Sensor Networks, pp. 479–488, IEEE, Cambridge, UK, April 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. A. Perring, R. Canetti, and J. Tygar, “The TESLA broadcast authentication protocol,” in RSA CryptoBytes, pp. 2–13, UC Berkeley and IBM Research, 2002. View at Google Scholar
  9. S. Cherukuri, K. Venkatasubramanian, and S. Gupta, “Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body,” in Proceedings of the International Conference on Parallel Processing Workshops (ICPPW '03), pp. 432–439, IEEE, 2003. View at Publisher · View at Google Scholar
  10. J. Sun, Y. Liu, and J. S. Dong, “Model checking CSP revisited: introducing a process analysis toolkit,” Communications in Computer and Information Science, vol. 17, no. 7, pp. 307–322, 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. Liu, J. Sun, and J. S. Dong, “Developing model checkers using PAT,” in Proceedings of the 8th International Symposium on Automated Technology for Verification and Analysis (ATVA '10), pp. 371–377, Singapore, 2010.
  12. Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Location-based compromise-tolerant security mechanisms for wireless sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 247–260, 2006. View at Publisher · View at Google Scholar · View at Scopus
  13. D. Dolev and A. C. Yao, “On the security of public key protocols,” IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 350–357, 1981. View at Publisher · View at Google Scholar
  14. J. Chitra, R. Girish, and L. Lavy, “SeAK: secure authentication and key generation protocol based on dual antennas for wireless body area networks,” in Radio Frequency Identification: Security and Privacy Issues, Lecture Notes in Computer Science, pp. 74–89, Springer, 2014. View at Google Scholar