Formal Anaylsis of Some Timed Security Properties in Wireless Protocols

We show how a recent language for the description of cryptographic protocols in a real time setting may be suitable to formally verify security aspects of wireless protocols. We define also a compositional proof rule for establishing security properties of such protocols. The effectiveness of our approach is shown by defining and studying the timed integrity property for μTESLA, a well-known protocol for wireless sensor networks. We are able to deal with protocol specifications with an arbitrary number of agents (senders as well as receivers) running the protocol.

[1]  Robin Milner,et al.  Communication and concurrency , 1989, PHI Series in computer science.

[2]  Kay Römer Time synchronization in ad hoc networks , 2001, MobiHoc '01.

[3]  Neil Evans,et al.  Analysing Time Dependent Security Properties in CSP Using PVS , 2000, ESORICS.

[4]  Matthew Hennessy,et al.  A Temporal Process Algebra , 1990, FORTE.

[5]  Roberto Gorrieri,et al.  Real-time information flow analysis , 2003, IEEE J. Sel. Areas Commun..

[6]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[7]  Fabio Martinelli,et al.  A Uniform Approach for the Definition of Security Properties , 1999, World Congress on Formal Methods.

[8]  Gavin Lowe,et al.  Analysing a Stream Authentication Protocol Using Model Checking , 2002, ESORICS.

[9]  Roberto Gorrieri,et al.  Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols , 2003, MFCS.

[10]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[11]  Roberto Gorrieri,et al.  A Simple Language for Real-Time Cryptographic Protocol Analysis , 2003, ESOP.

[12]  Roberto Gorrieri,et al.  Non Interference for the Analysis of Cryptographic Protocols , 2000, ICALP.

[13]  Mario Bravetti,et al.  A Process Algebraic Approach for the Analysis of Probabilistic Non-interference , 2011 .

[14]  Roberto Gorrieri,et al.  Compositional verification of integrity for digital stream signature protocols , 2003, Third International Conference on Application of Concurrency to System Design, 2003. Proceedings..