Abstract

Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS) is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP) and the “micro” version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA), named μTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack.

Highlights

  • Wireless sensor networks (WSNs) with proliferation in micro-electromechanical systems (MEMS)technology and low-cost smart sensors have emerged as a widely-deployed technology for gathering data from the environment

  • AVISPA does not differentiate among symmetric keys, and to keep our model simple, yet not deviating from the original specification, we reduce the number of keys between A and B to one

  • While developing the AVISPA model, we develop a combined model of two sub-protocols: node to node key agreement and data transmission with strong freshness

Read more

Summary

Introduction

Wireless sensor networks (WSNs) with proliferation in micro-electromechanical systems (MEMS). The read data are transmitted to a base station, which has more computing and storage resources than a node. One exception is Security Protocols for Sensor Networks (SPINS) [8], which has been designed to meet a set of security requirements. We have validated the security properties of SNEP by modeling the protocol using. Automated Validation of Internet Security Protocols and Applications (AVISPA) [10]. AVISPA is a push-button tool with industrial-strength technology for the analysis of different Internet security protocols and applications.

Secure Network Encryption Protocol
Data Transmission with Weak Freshness
Data Transmission with Strong Freshness
Counter Exchange Sub-Protocol
Node to Node Key Agreement Sub-Protocol
AVISPA
Architecture
Security Goal Specification
Number of Keys
Replacing MAC with a Hash Function
Node to Node Key Agreement with Strong Freshness
Counter Exchange Protocol with Strong Freshness
Model Validation and Analysis
Denial-of-Service Attack on Node to Node Key Agreement Protocol
Simulating a DoS Attack in AVISPA
Preventing the DoS Attack
Related Work
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call