Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP

In this paper, a formal analysis of security protocols in the field of wireless sensor networks is presented. Two complementary protocols, TinySec and LEAP, are modelled using the high-level formal language HLPSL, and verified using the model checking tool Avispa, where two main security properties are checked: authenticity and confidentiality of messages. As a result of this analysis, two attacks have been found: a man-in-the-middle- attack and a type flaw attack. In both cases confidentiality is compromised and an intruder may obtain confidential data from a node in the network. Two solutions to these attacks are proposed in the paper.

[1]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[2]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[3]  John C. Mitchell Finite-State Analysis of Security Protocols , 1998, CAV.

[4]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[5]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[6]  Gavin Lowe,et al.  How to prevent type flaw attacks on security protocols , 2003 .

[7]  Paul C. van Oorschot,et al.  A Protocol for Secure Public Instant Messaging , 2006, Financial Cryptography.

[8]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[9]  Mihir Bellare,et al.  A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[10]  Gregorio Díaz,et al.  Application of Formal Methods to the Analysis of Web Services Security , 2005, EPEW/WS-FM.

[11]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[12]  Gavin Lowe Casper: a compiler for the analysis of security protocols , 1998 .

[13]  Mihir Bellare,et al.  The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..

[14]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[15]  Danny Dolev,et al.  On the Security of Public Key Protocols (Extended Abstract) , 1981, FOCS.