Bioinspired Security Analysis of Wireless Protocols

被引:0
|
作者
Marinella Petrocchi
Angelo Spognardi
Paolo Santi
机构
[1] CNR Istitute of Informatics and Telematics,DTU Compute
[2] Technical University of Denmark,undefined
[3] MIT-Fraunhofer Ambient Mobility,undefined
来源
Mobile Networks and Applications | 2016年 / 21卷
关键词
Fraglets; Secure RFID protocols; Maude;
D O I
暂无
中图分类号
学科分类号
摘要
Fraglets represent an execution model for communication protocols that resembles the chemical reactions in living organisms. The strong connection between their way of transforming and reacting and formal rewriting systems makes a fraglet program amenable to automatic verification. Grounded on past work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary trying to circumvent the intended steps. The results of our analysis confirm the effectiveness of the cryptofraglets framework for the model and analysis of security properties and eventually show its potential to identify and uncover protocol flaws.
引用
收藏
页码:139 / 148
页数:9
相关论文
共 50 条
  • [21] Wireless Sensor Networks: Routing Protocols and Security Issues
    Anjali
    Shikha
    Sharma, Mohit
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [22] TAP - practical security protocols for wireless personal devices
    Lakshminarayanan, A
    2004 IEEE 15TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2884 - 2888
  • [23] Practical Access Control Protocols (PACPs) for Wireless Sensor Networks: Analysis of Security Pitfalls
    Sain, Mangal
    Kim, Hyun Ho
    Lee, Hoon Jae
    2017 19TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - OPENING NEW ERA OF SMART SOCIETY, 2017, : 822 - 826
  • [24] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [25] Comparative Security Analysis of Software Defined Wireless Networking (SDWN)- BGP and NETCONF Protocols
    Swapna, Asma Islam
    Huda, Md Rezaul
    Aion, Mainul Kabir
    PROCEEDINGS OF THE 2016 19TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), 2016, : 282 - 287
  • [26] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
  • [27] A decidable analysis of security protocols
    Rusinowitch, M
    EXPLORING NEW FRONTIERS OF THEORETICAL INFORMATICS, 2004, 155 : 21 - 21
  • [28] Analysis of the security of SET protocols
    Xiaoxing Weixing Jisuanji Xitong, 9 (704-707):
  • [29] Investigating the Prevalent Security Techniques in Wireless Sensor Network Protocols
    O'Mahony, George D.
    Harris, Philip J.
    Murphy, Colin C.
    2019 30TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2019,
  • [30] Formal Security Verification of Transport Protocols for Wireless Sensor Networks
    Vinh-Thong Ta
    Dvir, Amit
    Buttyan, Levente
    ADVANCED COMPUTATIONAL METHODS FOR KNOWLEDGE ENGINEERING, 2014, 282 : 389 - 403