Bioinspired Security Analysis of Wireless Protocols

被引:0
|
作者
Marinella Petrocchi
Angelo Spognardi
Paolo Santi
机构
[1] CNR Istitute of Informatics and Telematics,DTU Compute
[2] Technical University of Denmark,undefined
[3] MIT-Fraunhofer Ambient Mobility,undefined
来源
关键词
Fraglets; Secure RFID protocols; Maude;
D O I
暂无
中图分类号
学科分类号
摘要
Fraglets represent an execution model for communication protocols that resembles the chemical reactions in living organisms. The strong connection between their way of transforming and reacting and formal rewriting systems makes a fraglet program amenable to automatic verification. Grounded on past work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary trying to circumvent the intended steps. The results of our analysis confirm the effectiveness of the cryptofraglets framework for the model and analysis of security properties and eventually show its potential to identify and uncover protocol flaws.
引用
收藏
页码:139 / 148
页数:9
相关论文
共 50 条
  • [1] Bioinspired Security Analysis of Wireless Protocols
    Petrocchi, Marinella
    Spognardi, Angelo
    Santi, Paolo
    MOBILE NETWORKS & APPLICATIONS, 2016, 21 (01): : 139 - 148
  • [2] A Calculus for the Analysis of Wireless Network Security Protocols
    Ballardin, Francesco
    Merro, Massimo
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 206 - 222
  • [3] Quantitative analysis of security protocols in wireless networks
    Best, P
    Namuduri, K
    Pendse, R
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 290 - 291
  • [4] Security analysis of routing protocols in wireless sensor networks
    Sadeghi, Mohammad
    Khosravi, Farshad
    Atefi, Kayvan
    Barati, Mehdi
    International Journal of Computer Science Issues, 2012, 9 (1 1-3): : 465 - 472
  • [5] FORMAL ANALYSIS OF SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORKS
    Novotny, Marian
    CECC '09: 9TH CENTRAL EUROPEAN CONFERENCE ON CRYPTOGRAPHY - TREBIC, 2010, 47 : 81 - 97
  • [6] Comparison of wireless security protocols
    Zhou, T
    Yu, Q
    Liu, H
    CCCT 2003, VOL 5, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: II, 2003, : 94 - 99
  • [7] Formal analysis of some timed security properties in wireless protocols
    Gorrieri, R
    Martinelli, F
    Petrocchi, M
    Vaccarelli, A
    FORMAL METHODS FOR OPEN OBJECT-BASED DISTRIBUTED SYSTEMS, PROCEEDINGS, 2003, 2884 : 139 - 154
  • [8] Signal-flow-based analysis of wireless security protocols
    Capar, Cagatay
    Goeckel, Dennis
    Paterson, Kenneth G.
    Quaglia, Elizabeth A.
    Towsley, Don
    Zafer, Murtaza
    INFORMATION AND COMPUTATION, 2013, 226 : 37 - 56
  • [9] Security Survey of the IoT Wireless Protocols
    Krejci, Radek
    Hujnak, Ondrej
    Svepes, Marek
    2017 25TH TELECOMMUNICATION FORUM (TELFOR), 2017, : 60 - 63
  • [10] Security Protocols for Wireless Sensor Networks
    Bhalla, Monika
    Pandey, Nitin
    Kumar, Brijesh
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1005 - 1009