Bioinspired Security Analysis of Wireless Protocols

被引:0
|
作者
Marinella Petrocchi
Angelo Spognardi
Paolo Santi
机构
[1] CNR Istitute of Informatics and Telematics,DTU Compute
[2] Technical University of Denmark,undefined
[3] MIT-Fraunhofer Ambient Mobility,undefined
来源
Mobile Networks and Applications | 2016年 / 21卷
关键词
Fraglets; Secure RFID protocols; Maude;
D O I
暂无
中图分类号
学科分类号
摘要
Fraglets represent an execution model for communication protocols that resembles the chemical reactions in living organisms. The strong connection between their way of transforming and reacting and formal rewriting systems makes a fraglet program amenable to automatic verification. Grounded on past work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary trying to circumvent the intended steps. The results of our analysis confirm the effectiveness of the cryptofraglets framework for the model and analysis of security properties and eventually show its potential to identify and uncover protocol flaws.
引用
收藏
页码:139 / 148
页数:9
相关论文
共 50 条
  • [31] Security mechanisms and data access protocols in innovative wireless networks
    Pathan, Al-Sakib Khan
    Azad, Saiful
    Khan, Rasib
    Caviglione, Luca
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (09):
  • [32] Integrated Protocols to Ensure Security Services in Wireless Sensor Networks
    Faisal, Mohammed
    Al-Muhtadi, Jalal
    Al-Dhelaan, Abdullah
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [33] PROPOSAL OF SECURITY PROTOCOLS FOR THE LOCAL WIRELESS NETWORK OF THE CIENFUEGOS UNIVERSITY
    Gonzalez Paz, Alex
    Beltran Casanova, David
    Fuentes Gari, Ernesto Roberto
    REVISTA UNIVERSIDAD Y SOCIEDAD, 2016, 8 (04): : 128 - 135
  • [34] Eye Tracking Sensors as a Contactless Interfaces in Wireless Security Protocols
    Ogiela, Marek R.
    Ogiela, Lidia
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2021), 2021, : 290 - 291
  • [35] Introduction to the special session on wireless protocols security & hardware implementations
    Sklavos, N
    MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 757 - 758
  • [36] Review of Platforms and Security Protocols suitable for Wireless Sensor Networks
    Moeller, S.
    Newe, T.
    Lochmann, S.
    2009 IEEE SENSORS, VOLS 1-3, 2009, : 1001 - +
  • [37] A review of threats, protocols, and solutions to enhance the security of wireless networks
    Ataelmanan, Somya Khidir Mohmmed
    Al Hassan, Mostafa Ahmed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (04): : 108 - 115
  • [38] On a framework for energy-efficient security protocols in wireless networks
    Prasithsangaree, P
    Krishnamurthy, P
    COMPUTER COMMUNICATIONS, 2004, 27 (17) : 1716 - 1729
  • [39] Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
    Schaller, Patrick
    Schmidt, Benedikt
    Basin, David
    Capkun, Srdjan
    PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 109 - 123
  • [40] Formal method for the analysis of security protocols
    Lu, Laifeng
    Ma, Jianfeng
    ICIC Express Letters, 2011, 5 (10): : 3785 - 3789