2009 31st International Conference on Software Engineering - Companion Volume 2009
DOI: 10.1109/icse-companion.2009.5071045
|View full text |Cite
|
Sign up to set email alerts
|

Slede: Framework for automatic verification of sensor network security protocol implementations

Abstract: Verifying security properties of protocols requires developers to manually create protocol-specific intruder models, which could be tedious and error prone. We present Slede, a verification framework for sensor network applications. Key features include automation of: extraction of models, generation and composition of intrusion models, and verification of security properties.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0
1

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(19 citation statements)
references
References 9 publications
0
18
0
1
Order By: Relevance
“…We mention works focusing on the security of routing [19,2,20,32], local area networking [13], or broadcast authentication [12]. Closer to our work, the problem of DB has been treated formally in [17] by Meadows et al Their paper is concerned with distance estimation rather than ND, but more importantly, the approach is different.…”
Section: Related Workmentioning
confidence: 99%
“…We mention works focusing on the security of routing [19,2,20,32], local area networking [13], or broadcast authentication [12]. Closer to our work, the problem of DB has been treated formally in [17] by Meadows et al Their paper is concerned with distance estimation rather than ND, but more importantly, the approach is different.…”
Section: Related Workmentioning
confidence: 99%
“…Model checking has been used successfully in practice to verify wireless network security protocols (e.g. [35,36]). …”
Section: Formal Analysis Using Avispamentioning
confidence: 99%
“…Most work on analyzing the software for sensornets has been focused on verifying or understanding the network communication (e.g., [2,4]), or analyzing and predicting power consumption and duty cycles (e.g., [12,14]). There is just beginning some work in tools for assertion checking and correctness checking [1,10].…”
Section: Related Workmentioning
confidence: 99%