Abstract
Sensor Network Encryption Protocol (SNEP) is one of the secure building blocks of the SPINS Protocol Suite and provides data confidentiality, two-party data authentication and evidence of data freshness in a wireless sensor network. We have formally analyzed SNEP and a node-to-node key agreement protocol based on it, using the OTS/CafeOBJ method. Among other invariants, we have verified that the protocols possess the important security properties of authenticity and confidentiality of relevant message components. To our knowledge, we are the first to formally analyze SNEP using algebraic specification techniques.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8, 521–534 (2002)
Ouranos, I., Stefaneas, P.: Verifying Security Protocols for Sensor Networks using Algebraic Specification Techniques. In: Bozapalidis, S., Rahonis, G. (eds.) CAI 2007. LNCS, vol. 4728, pp. 247–259. Springer, Heidelberg (2007)
Ogata, K., Futatsugi, K.: Some Tips on Writing Proof Scores in the OTS/CafeOBJ method. In: Futatsugi, K., Jouannaud, J.-P., Meseguer, J. (eds.) Algebra, Meaning, and Computation. LNCS, vol. 4060, pp. 596–615. Springer, Heidelberg (2006)
Diaconescu, R., Futatsugi, K.: CafeOBJ Report. World Scientific, Singapore (1998)
Goguen, J.A., Meseguer, J.: Order-sorted algebra I: equational deduction for multiple inheritance, overloading, exceptions and partial operations. TCS 105, 217–273 (1992)
Goguen, J.A., Malcolm, G.: A Hidden Agenda. TCS 245, 55–101 (2002)
Diaconescu, R., Futatsugi, K.: Behavioural coherence in object-oriented algebraic specification. Journal of Universal Computer Science 6, 74–96 (2000)
Dolev, D., Yao, A.C.: On the Security of Public Key Protocols. IEEE Trans. on Inf. Theory 29, 198–208 (1983)
Tobarra, L., Cazorla, D., Cuartero, F.: Formal Analysis of Sensor Network Encryption Protocol (SNEP). In: Proc. IEEE MASS 2007, Pisa, Italy, pp. 1–6 (2007)
Newe, T.: On the Formal Verification of SNEP Key Agreement Protocol for Wireless Sensor Networks. In: Proc. SENSORCOMM 2007, pp. 186–191 (2007)
Ogata, K., Nakano, M., Kong, W., Futatsugi, K.: Induction - Guided Falsification. In: Liu, Z., He, J. (eds.) ICFEM 2006. LNCS, vol. 4260, pp. 114–131. Springer, Heidelberg (2006)
Ouranos, I., Stefaneas, P., Frangos, P.: An Algebraic Framework for Modeling of Mobile Systems. IEICE Trans. Fund. E90-A (9), 1986–1999 (2007)
Chevalier, Y., et al.: A high level protocol specification language for industrial security-sensitive protocols. In: Proc. SAPS, pp. 193–205 (2004)
Viganò, L.: Automated Security Protocol Analysis with the AVISPA Tool. In: Proc. MFPS 2005. ENTCS, vol. 155, pp. 61–86 (2005)
Newe, T., Coffey, T.: Formal verification logic for hybrid security protocols. Int. Journal of Comput. Syst. Sci. and Eng. 18, 17–25 (2003)
Ogata, K., Futatsugi, K.: Flaw and modification of the iKP electronic payment protocols. IPL 86(2), 57–62 (2003)
Ogata, K., Futatsugi, K.: Equational approach to formal analysis of TLS. In: Proc. 25th ICDCS, pp. 795–804 (2005)
Clavel, M., et al.: Maude: Specification and Programming in Rewriting Logic. TCS 285(2), 187–243 (2002)
Marti-Oliet, N., Meseguer, J.: Rewriting Logic: Roadmap and Bibliography. TCS 285(2), 121–154 (2002)
Ölveczky, P.C., Thorvaldsen, S.: Formal Modeling, performance estimation, and model checking of wireless sensor network algorithms in Real-Time Maude. TCS 410(2-3), 254–280 (2009)
Perrig, A., et al.: Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In: Proc. IEEE Sec. and Privacy Symp., pp. 56–73 (2000)
Ogata, K., Futatsugi, K.: Simulation based verification for invariant properties in the OTS/CafeOBJ method. Electr. Notes Theor. Comput. Sci. 201, 127–154 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ouranos, I., Stefaneas, P., Ogata, K. (2010). Formal Modeling and Verification of Sensor Network Encryption Protocol in the OTS/CafeOBJ Method. In: Margaria, T., Steffen, B. (eds) Leveraging Applications of Formal Methods, Verification, and Validation. ISoLA 2010. Lecture Notes in Computer Science, vol 6415. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16558-0_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-16558-0_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16557-3
Online ISBN: 978-3-642-16558-0
eBook Packages: Computer ScienceComputer Science (R0)