{"title":"无线传感器网络密钥交换协议:使用CSN模态逻辑的形式化验证","authors":"Yue Li, T. Newe","doi":"10.1109/SAS13374.2008.4472969","DOIUrl":null,"url":null,"abstract":"Due to the growth of Wireless Sensor Networks (WSN), many advanced applications such as industry process monitoring, patient monitoring and public service communications have been deployed. Security of data will be an important factor for their full adoption. Efficient key exchange protocols are required for Security of large scale densely deployed wireless networks of resource limited sensor nodes. Huang et al. proposed a hybrid authenticated key exchange protocol for secure communication between a sensor and a security manager in WSN. In order to provide assurance that these protocols are verifiably secure and trustworthy it is necessary to perform a formal verification on their design specifications. In this paper Huang et al. 's protocol is discussed and a formal verification is performed using the Coffey-Saidha-Newe (CSN) modal logic. As a result of this verification a modification is suggested to improve the protocol security.","PeriodicalId":225041,"journal":{"name":"2008 IEEE Sensors Applications Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Key exchange protocol for Wireless Sensor Network: Formal verification using CSN modal logic\",\"authors\":\"Yue Li, T. Newe\",\"doi\":\"10.1109/SAS13374.2008.4472969\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the growth of Wireless Sensor Networks (WSN), many advanced applications such as industry process monitoring, patient monitoring and public service communications have been deployed. Security of data will be an important factor for their full adoption. Efficient key exchange protocols are required for Security of large scale densely deployed wireless networks of resource limited sensor nodes. Huang et al. proposed a hybrid authenticated key exchange protocol for secure communication between a sensor and a security manager in WSN. In order to provide assurance that these protocols are verifiably secure and trustworthy it is necessary to perform a formal verification on their design specifications. In this paper Huang et al. 's protocol is discussed and a formal verification is performed using the Coffey-Saidha-Newe (CSN) modal logic. As a result of this verification a modification is suggested to improve the protocol security.\",\"PeriodicalId\":225041,\"journal\":{\"name\":\"2008 IEEE Sensors Applications Symposium\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-03-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE Sensors Applications Symposium\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SAS13374.2008.4472969\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE Sensors Applications Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAS13374.2008.4472969","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Key exchange protocol for Wireless Sensor Network: Formal verification using CSN modal logic
Due to the growth of Wireless Sensor Networks (WSN), many advanced applications such as industry process monitoring, patient monitoring and public service communications have been deployed. Security of data will be an important factor for their full adoption. Efficient key exchange protocols are required for Security of large scale densely deployed wireless networks of resource limited sensor nodes. Huang et al. proposed a hybrid authenticated key exchange protocol for secure communication between a sensor and a security manager in WSN. In order to provide assurance that these protocols are verifiably secure and trustworthy it is necessary to perform a formal verification on their design specifications. In this paper Huang et al. 's protocol is discussed and a formal verification is performed using the Coffey-Saidha-Newe (CSN) modal logic. As a result of this verification a modification is suggested to improve the protocol security.