期刊文献+

无线传感器网络新鲜性的形式化分析

Formal analysis of freshness in wireless sensor networks
下载PDF
导出
摘要 为了更好地解决无线传感器网络的安全与隐私问题,使其具有更广泛的应用领域,提出了一种使用形式化方法 Object-Z分析和验证无线传感器网络安全特性的新方法.该方法分析了一个基于Nonce机制的简单密钥协商协议的新鲜性问题.首先定义了协议使用到的数据类型和辅助函数等组件,然后建立了协议的3个角色模型:发起者、响应者和基站.在此基础上通过实例化角色对象构建了密钥协商协议模型,实现角色之间的相互通信,最后采用形式化逻辑推理的方式对协议通信过程的新鲜性进行验证.结果表明,使用Nonce机制可以保证传输数据的新鲜性,说明该分析方法对无线传感器网络的安全特性的分析是有效的. In order to solve the security and privacy issues of the wireless sensor networks and ex- pand their application fields, a novel method which uses the formal method Object-Z is proposed to analyze and verify security features. In this method, the freshness of a simple key agreement proto- col based on the Nonce mechanism is analyzed. First, the protocol components such as data types and auxiliary functions are defined, and then three role models, i. e. , the initiator, the responder and the base station are built. A protocol model in which roles can communicate with each other is built by instantiating role objects. Finally, the freshness of communication process in the protocol is verified by formal reasoning. The results show that the Nonce mechanism can guarantee the freshness of transmission data, and the proposed method is valid in analyzing secure features.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第A02期245-249,共5页 Journal of Southeast University:Natural Science Edition
基金 国家自然科学基金资助项目(61170245)
关键词 无线传感器网络 安全特性 新鲜性 形式化方法 wireless sensor network security feature freshness formal method
  • 相关文献

参考文献16

  • 1Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks [ C ]//Proceeding of the 2003 IEEE Symposium on Security and Privacy. Berkeley, CA, USA, 2003: 197-213.
  • 2余旺科,马文平,陈和风,高胜.一种有效的无线传感器网络密钥管理方案[J].东南大学学报(自然科学版),2011,41(1):20-24. 被引量:2
  • 3Perrig A, Szewczyk R, Wen V, et al. SPINS: security protocols for sensor networks I J ]- Wireless Networks Journal, 2002, 8(5) : 521 -534.
  • 4Zhu S, Setia S, Jajodia S. LEAP + : efficient security mechanisms for large-scale distributed sensor networks [ J]. ACM Transactions on Sensor Networks, 2006, 2 (4) : 500-528.
  • 5Deng J, Han R, Mishra S. INSENS : intrusion-tolerant routing in wireless sensor networks [ J ]. Computer Com- munications, 2006, 29(2): 216-230.
  • 6Lazos L, Poovendran R. SeRLoc: secure range-inde- pendent localization for wireless sensor networks [ C ]// Proceedings of the 4th International Symposium on In- formation Processing in Sensor Networks. Los Angeles,CA, USA, 2005:21 -30.
  • 7Chan H, Perdg A, Przydatek B. SIA: secure informa- tion aggregation in sensor networks [ J ]. Journal of Computer Security, 2007, 15( 1 ) : 69 - 102.
  • 8蒋睿,胡爱群.Formal analysis of robust email protocol based on authentication tests[J].Journal of Southeast University(English Edition),2009,25(2):147-151. 被引量:1
  • 9Hannotin X, Maggi P, Sisto R. Formal specification and verification of mobile agent data integrity proper- ties: a case studyl C]//Proceedings of the 5th Interna- tional Conference on Mobile Agents. Atlanta, GA, USA, 2001:42-53.
  • 10李鹏飞,马恒太,侯玉文,邱田.移动代理完整性协议形式化分析方法研究[J].电子学报,2009,37(8):1669-1674. 被引量:2

二级参考文献43

  • 1蒋睿,李建华,潘理.基于串空间模型的3GPP认证密钥交换协议分析[J].上海交通大学学报,2006,40(5):791-795. 被引量:5
  • 2X Hannotin, P Maggi, Riccardo Sisto. Formal specification and verification of mobile agent data integrity properties: a case study[ A]. Mobile Agents: 5th Intemational Conference[ C]. Atlanta, GA, USA, 2001.41.
  • 3P Ryan,等著,张玉清,等译.安全协议的建模与分析[M].北京,机械工业出版社,2005.
  • 4P Maggi, R Sisto. Experiments on formal verification of mobile agent data integrity properties [ A ]. Workshop on Objects and Agents 2002(WOA2002) [C]. Milano, Italy, 2002.131 - 136.
  • 5Raja Al-Jaljouli. A Proposed Security Prototcol for Data Gathering Mobile Agents [ R]. The University of New South Wales, Report, Sydney, Australia, 21304.
  • 6Raja Al-Jaljouli. Formal Methods in the Enhancement of the Data Security Protocols of Mobile Agents[ R]. The University of New South Wales,Report, Sydney,Australia,2005.
  • 7P Maggi, R Sisto. A configurable mobile agent data protection protocol[A]. AAMAS'03 [ C]. Melbourne, Australia, 2003. 851 - 858,.
  • 8S A Schneider. Verifying authentication protocols with CSP[ J]. IFEF. Transaclions on Software Engineering. 1998,24(9):741 - 758.
  • 9S A Schneider. Formal analysis of a non-repudiation protocol[A]. 11th Computer Security Foundations Workshop[C]. Rockport Massachusetts: IEEE Computer Society Press, 1998. 54 - 65.
  • 10G Karjoth,N Asokan,C Gulcu. Protecting the computation resuits of free-roaming agents[J] .Personal and Ubiquitous Compuling, 1998,2(2) :92 - 99.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部