{"title":"无线传感器网络中Kerberos安全协议的时间和能量成本分析","authors":"Farshad Amin, A. Jahangir","doi":"10.1109/ISIAS.2011.6122838","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Networks are composed of small, low cost, resource-constrained computing nodes equipped with low power wireless transceivers. In this paper, we study and model the time and energy cost of Kerberos protocol by using timed automata in WSN. We model check the protocol using UPPAAL. We show that considering time in the analysis of security protocols yield more confident results.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks\",\"authors\":\"Farshad Amin, A. Jahangir\",\"doi\":\"10.1109/ISIAS.2011.6122838\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless Sensor Networks are composed of small, low cost, resource-constrained computing nodes equipped with low power wireless transceivers. In this paper, we study and model the time and energy cost of Kerberos protocol by using timed automata in WSN. We model check the protocol using UPPAAL. We show that considering time in the analysis of security protocols yield more confident results.\",\"PeriodicalId\":139268,\"journal\":{\"name\":\"2011 7th International Conference on Information Assurance and Security (IAS)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 7th International Conference on Information Assurance and Security (IAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIAS.2011.6122838\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 7th International Conference on Information Assurance and Security (IAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIAS.2011.6122838","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks
Wireless Sensor Networks are composed of small, low cost, resource-constrained computing nodes equipped with low power wireless transceivers. In this paper, we study and model the time and energy cost of Kerberos protocol by using timed automata in WSN. We model check the protocol using UPPAAL. We show that considering time in the analysis of security protocols yield more confident results.