Abstract
Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS) is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP) and the “micro” version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA), named μTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack.
Highlights
Wireless sensor networks (WSNs) with proliferation in micro-electromechanical systems (MEMS)technology and low-cost smart sensors have emerged as a widely-deployed technology for gathering data from the environment
AVISPA does not differentiate among symmetric keys, and to keep our model simple, yet not deviating from the original specification, we reduce the number of keys between A and B to one
While developing the AVISPA model, we develop a combined model of two sub-protocols: node to node key agreement and data transmission with strong freshness
Summary
Wireless sensor networks (WSNs) with proliferation in micro-electromechanical systems (MEMS). The read data are transmitted to a base station, which has more computing and storage resources than a node. One exception is Security Protocols for Sensor Networks (SPINS) [8], which has been designed to meet a set of security requirements. We have validated the security properties of SNEP by modeling the protocol using. Automated Validation of Internet Security Protocols and Applications (AVISPA) [10]. AVISPA is a push-button tool with industrial-strength technology for the analysis of different Internet security protocols and applications.
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have