Security analysis of Robust User Authentication Protocol

Ad hoc networks are a promising technology for implementing the ubiquitous computing paradigm. And, as in any other domain, security is a very important aspect. Authentication, as a first security goal to be achieved, has been targeted by many protocol propositions. But in order to use an implementation of such a protocol in a real situation, its security properties must be proved. Formal verification through model checking is a technique that can perform this demonstration with high accuracy. We present the use of formal verification over a protocol proposed for wireless sensor networks in order to correctly authenticate the user before allowing him to access the services of the network. Casper/FDR2 approach was used with success in proving that the desired security properties of the protocol were verified.

[1]  C. Pearce,et al.  A secure communication protocol for ad-hoc wireless sensor networks , 2004, Proceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004..

[2]  Kamil Saraç,et al.  A security framework for service overlay networks: Access control , 2008, 2008 5th International Conference on Broadband Communications, Networks and Systems.

[3]  Luiz A. DaSilva,et al.  Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.

[4]  Riccardo Sisto,et al.  Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study , 2001, Mobile Agents.

[5]  Jin-Young Choi,et al.  FDR verification of ESANP protocol in Ad hoc Network , 2004, SNPD.

[6]  Davor Obradovic,et al.  Formal Analysis of Convergence of Routing Protocols , 2000 .

[7]  Rahmat Budiarto,et al.  Unreliable Network Re-Authentication Protocol Based on Hybrid Key Using CSP Approach , 2007 .

[8]  Sumeet Singh,et al.  SecureWS - A Secure, Application Layer Communication Channel for Web Services , 2006 .

[9]  Todd R. Andel,et al.  Formal security evaluation of ad hoc routing protocols , 2007 .

[10]  Debmalya Biswas,et al.  Application of Model Checking to AXML System's Security: A Case Study , 2006, WS-FM.

[11]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[12]  Sudip Misra,et al.  Guide to Wireless Ad Hoc Networks , 2009, Computer Communications and Networks.

[13]  Huaxiong Wang,et al.  Formal Security Analysis of Australian E-passport Implementation , 2008, AISC.

[14]  Huaxiong Wang,et al.  Formal analysis of card-based payment systems in mobile devices , 2006, ACSW.

[15]  John Marshall,et al.  An Analysis Of The Secure Routing Protocol For Mobile Ad Hoc Network Route Discovery: Using Intuitiv , 2003 .

[16]  Ed Dawson,et al.  Classification of Authentication Protocols: A Practical Approach , 2000, ISW.