A Calculus for the Analysis of Wireless Network Security Protocols

We propose a timed broadcasting calculus for wireless systems. The operational semantics of our calculus is given both in terms of a Reduction Semantics and in terms of a Labelled Transition Semantics. We prove that the two semantics coincide. The labelled transition system is used to derive a standard notion of (weak) bi-similarity which is proved to be a congruence. We use our simulation theory to adapt Gorrieri and Martinelli's tGNDC scheme to investigate, in our setting, the safety of non-trivial wireless network security protocols.

[1]  Roberto Gorrieri,et al.  Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks , 2008, Journal of Automated Reasoning.

[2]  Massimo Merro,et al.  An Observational Theory for Mobile Ad Hoc Networks (full version) , 2009, Inf. Comput..

[3]  J. R. Freer Computer Communications and Networks , 1988 .

[4]  Massimo Merro,et al.  An Observational Theory for Mobile Ad Hoc Networks , 2007, MFPS.

[5]  Roberto Gorrieri,et al.  A simple framework for real-time cryptographic protocol analysis with compositional proof rules , 2004, Sci. Comput. Program..

[6]  C. R. Ramakrishnan,et al.  A process calculus for Mobile Ad Hoc Networks , 2008, Sci. Comput. Program..

[7]  Fabio Martinelli,et al.  A Uniform Approach for the Definition of Security Properties , 1999, World Congress on Formal Methods.

[8]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[9]  S. Anderson,et al.  Secure Synthesis of Code: A Process Improvement Experiment , 1999, World Congress on Formal Methods.

[10]  Fatemeh Ghassemi,et al.  Equational Reasoning on Ad Hoc Networks , 2009, FSEN.

[11]  Massimo Merro,et al.  A timed calculus for wireless systems , 2011, Theor. Comput. Sci..

[12]  Sam Blackshear,et al.  R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks , 2010, SAC '10.

[13]  Robin Milner,et al.  Communication and concurrency , 1989, PHI Series in computer science.

[14]  Jens Chr. Godskesen A Calculus for Mobile Ad Hoc Networks , 2007, COORDINATION.

[15]  Chris Hankin,et al.  A framework for security analysis of mobile wireless networks , 2006, Theor. Comput. Sci..

[16]  Sudip Misra,et al.  Guide to Wireless Ad Hoc Networks , 2009, Computer Communications and Networks.

[17]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[18]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[19]  Farhad Arbab,et al.  Coordination Models and Languages , 1998, Adv. Comput..

[20]  Ivan Lanese,et al.  An operational semantics for a calculus for wireless systems , 2010, Theor. Comput. Sci..

[21]  Matthew Hennessy,et al.  A Process Algebra for Timed Systems , 1995, Inf. Comput..

[22]  Sebastian Nanz,et al.  Mobility Models and Behavioural Equivalence for Wireless Networks , 2009, COORDINATION.

[23]  Chae Hoon Lim LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.