2009 22nd IEEE Computer Security Foundations Symposium 2009
DOI: 10.1109/csf.2009.6
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks

Abstract: We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium used and the distance traveled. All agents, including intruders, are subject to these constraints and this re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(26 citation statements)
references
References 35 publications
0
26
0
Order By: Relevance
“…Recently, several frameworks have been proposed to model wireless communication and/or routing protocols in a more accurate way (e.g. [15,17,10]). However, these models do not take into account several features that seem crucial to model routing protocols (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, several frameworks have been proposed to model wireless communication and/or routing protocols in a more accurate way (e.g. [15,17,10]). However, these models do not take into account several features that seem crucial to model routing protocols (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…In the context of wireless systems, message-based attacker models have been adopted in a number of works, e. g., in [11,15,16,22,24,25]. In these works, the attacker is usually assumed to be able to eavesdrop, insert, modify, replay, delay, or delete any signal being transmitted on the wireless channel.…”
Section: Classifying Wireless Attacksmentioning
confidence: 99%
“…On the other hand, the strongest attacker models are often not motivated by practical considerations. For example, Dolev-Yao based models will allow the attacker to transfer information to remote locations instantaneously while this is not realistic [22]. Although designing a system with an overestimation of the attacker capabilities does not harm the security of the system, it may complicate the proposed solutions and create unnecessary overhead on the communication or make the hardware setup more costly.…”
Section: Introductionmentioning
confidence: 99%
“…Also, [31] shows a formal approach, but against honest provers only and without specifying security goals. Finally, the formal methods approach in [35] thoroughly models distance bounding with formal methods, but treats wireless networks in general, assuming that provers and verifiers have equal capacities (unlike RFID systems, where tags are computationally weaker). Additionally, some physical properties of RF communication, such as the unreliability of tags' backscattering and colliding signals, are unaccounted for.…”
Section: Our Contributionsmentioning
confidence: 99%