Skip to main content
Log in

Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In this paper, a formal analysis of security protocols in the field of wireless sensor networks is presented. Three complementary protocols, TinySec, LEAP and TinyPK, are modelled using the high-level formal language HLPSL, and verified using the model checking tool AVISPA, where two main security properties are checked: authenticity and confidentiality of messages. As a result of this analysis, two attacks have been found: a man-in-the-middle-attack and a type flaw attack. In both cases confidentiality is compromised and an intruder may obtain confidential data from a node in the network. Two solutions to these attacks are proposed in the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Armando, A., Basin, D. A., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P. H., Héam, P. C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., & Vigneron, L. (2005). The AVISPA tool for the automated validation of internet security protocols and applications. In K. Etessami & S. K. Rajamani (Eds.), Lecture notes in computer science : Vol. 3576. CAV (pp. 281–285). Berlin: Springer.

    Google Scholar 

  2. Backes, M., Mödersheim, S., Pfitzmann, B., & Viganò, L. (2006). Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. In L. Aceto & A. Ingólfsdóttir (Eds.), Lecture notes in computer science : Vol. 3921. FoSSaCS (pp. 428–445). Berlin: Springer.

    Google Scholar 

  3. Bellare, M., Desai, A., Jokipii, E., & Rogaway, P. (1997). A concrete security treatment of symmetric encryption. In Proceedings of 38th annual symposium on foundations of computer science (pp. 394–403). New York: IEEE.

    Chapter  Google Scholar 

  4. Bellare, M., Kilian, J., & Rogaway, P. (2000). The security of the cipher block chaining message authentication code. Journal of Computer and Systems Sciences, 61(3), 362–399.

    Article  Google Scholar 

  5. Bhargavan, K., Fournet, C., & Gordon, A. D. (2004). Verifying policy-based security for web services. In V. Atluri, B. Pfitzmann, & P. D. McDaniel (Eds.), ACM conference on computer and communications security (pp. 268–277). New York: Assoc. Comput. Mach.

    Google Scholar 

  6. Chan, H., Perrig, A., & Song, D. X. (2003). Random key predistribution schemes for sensor networks. In IEEE symposium on security and privacy (p. 197). Los Alamitos: IEEE Comput. Soc.

    Google Scholar 

  7. Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P. H., Mantovani, J., Mödersheim, S., & Vigneron, L. (2004) A high level protocol specification language for industrial security-sensitive protocols. In Proceedings of workshop on specification and automated processing of security requirements (SAPS) (pp. 193–205).

  8. Clarke, E. M., Grumberg, O., & Peled, D. A. (1999). Model checking. Cambridge: MIT Press.

    Google Scholar 

  9. Dolev, D., & Yao, A. C. C. (1981). On the security of public key protocols. In FOCS (pp. 350–357). New York: IEEE.

    Google Scholar 

  10. Eschenauer, L., & Gligor, V. (2002). A key-management scheme for distributed sensor networks. In V. Atluri (Ed.), ACM conference on computer and communications security (pp. 41–47). New York: Assoc. Comput. Mach.

    Google Scholar 

  11. Glouche, Y., Genet, T., Heen, O., & Courtay, O. (2006). A security protocol animator tool for AVISPA. In ARTIST2 workshop on security specification and verification of embedded systems, Pisa.

  12. Heather, J., Lowe, G., & Schneider, S. (2003). How to prevent type flaw attacks on security protocols. Journal of Computer Security, 11(2), 217–244.

    Google Scholar 

  13. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D. E., & Pister, K. S. J. (2000). System architecture directions for networked sensors. In Inter. conf. on architectural support for programming languages and operating systems, ASPLOS (pp. 93–104).

  14. Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys 2004 (pp. 162–175). Baltimore, MD, USA, November 3–5, 2004. New York: Assoc. Comput. Mach.

    Chapter  Google Scholar 

  15. Lowe, G. (1998). Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(1–2), 53–84.

    Google Scholar 

  16. Mitchell, J. C. (1998). Finite-state analysis of security protocols. In A. J. Hu & M. Y. Vardi (Eds.), Lecture notes in computer science : Vol. 1427. CAV (pp. 71–76). Berlin: Springer.

    Google Scholar 

  17. Perrig, A., Stankovic, J. A., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53–57.

    Article  Google Scholar 

  18. Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.

    Article  Google Scholar 

  19. Tobarra, M. L., Cazorla, D., Cuartero, F., & Diaz, G. (2005). Application of formal methods to the analysis of web services security. In M. Bravetti, L. Kloul, & G. Zavattaro (Eds.), Lecture notes in computer science : Vol. 3670. EPEW/WS-FM (pp. 215–229). Berlin: Springer.

    Google Scholar 

  20. Tobarra, M. L., Cazorla, D., Cuartero, F., & Diaz, G. (2006). Formal verification of TLS handshake and extensions for wireless networks. In Proc. of IADIS international conference on applied computing (AC’06) (pp. 57–64). San Sebastian: IADIS.

    Google Scholar 

  21. Watro, R., Kong, D., Cuti, S. F., Gardiner, C., Lynn, C., & Kruus, P. (2004). Tinypk: securing sensor networks with public key technology. In SASN’04: Proceedings of the 2nd ACM workshop on security of ad hoc and sensor networks (pp. 59–64). New York: Assoc. Comput. Mach. doi:10.1145/1029102.1029113, http://portal.acm.org/citation.cfm?id=1029113.

    Chapter  Google Scholar 

  22. Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In S. Jajodia, V. Atluri, & T. Jaeger (Eds.), ACM conference on computer and communications security (pp. 62–72). New York: Assoc. Comput. Mach.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Llanos Tobarra.

Additional information

This work has been supported by the Spanish government with the project “Application of Formal Methods to Web Services”, with reference TIN2006-15578-C02-02, and the JCCM regional project “Application of formal methods to the design and analysis of Web Services and e-commerce” (PAC06-0008-6995).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tobarra, L., Cazorla, D., Cuartero, F. et al. Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK. Telecommun Syst 40, 91–99 (2009). https://doi.org/10.1007/s11235-008-9131-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-008-9131-z

Keywords

Navigation