On the formal verification of a cluster based key management protocol for Wireless Sensor Networks

Reiner Dojen, Fan Zhang, Tom Coffey

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Security is a primary problem in wireless electronic communications. However, the limitations of Wireless Sensor Networks (small size, low battery capacity and exposed communication media) often turn the focus to power consumption rather than security. However, insufficient security protection can leave a WSN application open to attack, rendering the supplied service not trustworthy or unavailable. This paper presents a formal verification of a cluster based key management protocol for Wireless Sensor Networks. A number of weaknesses are identified in the verified protocol that can be exploited by an intruder. These weaknesses allow various attacks, such as impersonating the base station to the network, impersonating a cluster head to sensor nodes or to disrupt the network configuration. A detailed discussion on these weaknesses is presented and modifications to the protocol are proposed to fix these weaknesses. Successful verification of the proposed fixed protocol demonstrates its correctness.

Original languageEnglish
Title of host publication2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
Pages499-506
Number of pages8
DOIs
Publication statusPublished - 2008
Event2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008 - Austin, TX, United States
Duration: 7 Dec 20089 Dec 2008

Publication series

NameConference Proceedings of the IEEE International Performance, Computing, and Communications Conference

Conference

Conference2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
Country/TerritoryUnited States
CityAustin, TX
Period7/12/089/12/08

Fingerprint

Dive into the research topics of 'On the formal verification of a cluster based key management protocol for Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this