Publication
Security in Wireless Sensor Networks: A formal verification of protocols
| dc.contributor.author | Spilere Nandi, Giann | |
| dc.contributor.author | Pereira, David | |
| dc.contributor.author | Vigil, Martín | |
| dc.contributor.author | Moraes, Ricardo | |
| dc.contributor.author | Schiaffino Morales, Analúcia | |
| dc.contributor.author | Araújo, Gustavo | |
| dc.date.accessioned | 2020-10-28T15:46:45Z | |
| dc.date.embargo | 2120 | |
| dc.date.issued | 2019 | |
| dc.description.abstract | The increase of the digitalization taking place in various industrial domains is leading developers towards the design and implementation of more and more complex networked control systems (NCS) supported by Wireless Sensor Networks (WSN). This naturally raises new challenges for the current WSN technology, namely in what concerns improved guarantees of technical aspects such as real-time communications together with safe and secure transmissions. Notably, in what concerns security aspects, several cryptographic protocols have been proposed. Since the design of these protocols is usually error-prone, security breaches can still be exposed and MALICIOUSly exploited unless they are rigorously analyzed and verified. In this paper we formally verify, using ProVerif, three cryptographic protocols used in WSN, regarding the security properties of secrecy and authenticity. The security analysis performed in this paper is more robust than the ones performed in related work. Our contributions involve analyzing protocols that were modeled considering an unbounded number of participants and actions, and also the use of a hierarchical system to classify the authenticity results. Our verification shows that the three analyzed protocols guarantee secrecy, but can only provide authenticity in specific scenarios. | pt_PT |
| dc.description.version | info:eu-repo/semantics/publishedVersion | pt_PT |
| dc.identifier.doi | 10.1109/INDIN41052.2019.8972080 | pt_PT |
| dc.identifier.issn | 2378-363X | |
| dc.identifier.uri | http://hdl.handle.net/10400.22/16365 | |
| dc.language.iso | eng | pt_PT |
| dc.peerreviewed | yes | pt_PT |
| dc.publisher | IEEE | pt_PT |
| dc.relation | REASSURE, ref. NORTE-01-0145-FEDER-028550 | pt_PT |
| dc.relation.publisherversion | https://ieeexplore.ieee.org/document/8972080 | pt_PT |
| dc.subject | Wireless Sensor Networks | pt_PT |
| dc.subject | Security | pt_PT |
| dc.subject | Formal Verification | pt_PT |
| dc.title | Security in Wireless Sensor Networks: A formal verification of protocols | pt_PT |
| dc.type | conference object | |
| dspace.entity.type | Publication | |
| oaire.citation.conferencePlace | Helsinki-Espoo, Finland | pt_PT |
| oaire.citation.endPage | 431 | pt_PT |
| oaire.citation.startPage | 425 | pt_PT |
| oaire.citation.title | Proceedings of the 17th IEEE International Conference on Industrial Informatics (INDIN 2019) | pt_PT |
| rcaap.rights | closedAccess | pt_PT |
| rcaap.type | conferenceObject | pt_PT |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- COM_CISTER_Spilere Nandi_2019.pdf
- Size:
- 163.32 KB
- Format:
- Adobe Portable Document Format
