Formal verification of a key agreement protocol for wireless sensor networks

Yue Li, Dehua Chen, Thomas Newe

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Wireless sensor networks (WSNs) have gained much attention in both industry and research communities where they are expected to bring the interaction between humans, environment, and machines to a new level. Due to the resource constraints of sensors nodes, it is infeasible to use traditional key establishment techniques that find use in fixed communication systems. In recent years a number of group key agreement protocols have been proposed for resourcelimited wireless sensor devices. However, these protocols do not satisfy some important security properties such as mutual authentication and forward secrecy. In this paper, we propose a hybrid authenticated group key agreement protocol for WSNs. This hybrid protocol reduces the high cost public-key operations at the sensor side and replaces them with efficient symmetric-key based operations. In order to provide assurance that the proposed protocol is verifiably secure and trustworthy, a formal verification is performed on the protocol's design specification.

Original languageEnglish
Title of host publicationProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012
Pages1537-1542
Number of pages6
DOIs
Publication statusPublished - 2012
Event11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - Liverpool, United Kingdom
Duration: 25 Jun 201227 Jun 2012

Publication series

NameProc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012

Conference

Conference11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012
Country/TerritoryUnited Kingdom
CityLiverpool
Period25/06/1227/06/12

Keywords

  • Formal Logic
  • Key agreement protocol
  • Security
  • Wireless Sensor Networks

Fingerprint

Dive into the research topics of 'Formal verification of a key agreement protocol for wireless sensor networks'. Together they form a unique fingerprint.

Cite this