TY - GEN
T1 - On the formal verification of a cluster based key management protocol for Wireless Sensor Networks
AU - Dojen, Reiner
AU - Zhang, Fan
AU - Coffey, Tom
PY - 2008
Y1 - 2008
N2 - Security is a primary problem in wireless electronic communications. However, the limitations of Wireless Sensor Networks (small size, low battery capacity and exposed communication media) often turn the focus to power consumption rather than security. However, insufficient security protection can leave a WSN application open to attack, rendering the supplied service not trustworthy or unavailable. This paper presents a formal verification of a cluster based key management protocol for Wireless Sensor Networks. A number of weaknesses are identified in the verified protocol that can be exploited by an intruder. These weaknesses allow various attacks, such as impersonating the base station to the network, impersonating a cluster head to sensor nodes or to disrupt the network configuration. A detailed discussion on these weaknesses is presented and modifications to the protocol are proposed to fix these weaknesses. Successful verification of the proposed fixed protocol demonstrates its correctness.
AB - Security is a primary problem in wireless electronic communications. However, the limitations of Wireless Sensor Networks (small size, low battery capacity and exposed communication media) often turn the focus to power consumption rather than security. However, insufficient security protection can leave a WSN application open to attack, rendering the supplied service not trustworthy or unavailable. This paper presents a formal verification of a cluster based key management protocol for Wireless Sensor Networks. A number of weaknesses are identified in the verified protocol that can be exploited by an intruder. These weaknesses allow various attacks, such as impersonating the base station to the network, impersonating a cluster head to sensor nodes or to disrupt the network configuration. A detailed discussion on these weaknesses is presented and modifications to the protocol are proposed to fix these weaknesses. Successful verification of the proposed fixed protocol demonstrates its correctness.
UR - http://www.scopus.com/inward/record.url?scp=62849121055&partnerID=8YFLogxK
U2 - 10.1109/PCCC.2008.4745088
DO - 10.1109/PCCC.2008.4745088
M3 - Conference contribution
AN - SCOPUS:62849121055
SN - 9781424433674
T3 - Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference
SP - 499
EP - 506
BT - 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
T2 - 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
Y2 - 7 December 2008 through 9 December 2008
ER -