Abstract. In this paper, a formal analysis of security protocols in the field of wireless sensor networks is presented. Two complementary pro-tocols, TinySec and LEAP, are modelled using the high-level formal lan-guage HLPSL, and verified using the model checking tool Avispa, where two main security properties are checked: authenticity and confidential-ity of messages. As a result of this analysis, two attacks have been found: a man-in-the-middle- attack and a type flaw attack. In both cases confi-dentiality is compromised and an intruder may obtain confidential data from a node in the network. Two solutions to these attacks are proposed in the paper. Keywords:Wireless sensor, model checking, security protocols, avispa toolbox
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They ...
Wireless sensor networks consist of a large amount of sensor nodes, small low-cost wireless computin...
Nodes in a sensor network may be lost due to malicious attack or either power loss. To extend the li...
The increase of the digitalization taking place in various industrial domains is leading developers ...
Wireless Sensor Networks (WSNs) are particularly prone to security attacks. However, it is well-know...
This article presents a novel approach to the analysis of wireless sensor networks (WSN) security, b...
Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public envi...
The contribution of this work is an approach for lightweight specification and verification of nesC ...
Because of their low cost, small size, low resources and self-organizing nature a Wireless Sensor Ne...
Abstract: Wireless Sensor Networks(WSNs) have been widely used in various applications. Recent advan...
Abstract- Wireless sensor networking continues to evolve as one of the most exciting and challenging...
Abstract: Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor environments, an...
When designing Wireless Sensor Networks it is important to analyze their security risks and provide ...
There are many applications of wireless sensor networks (WSNs) we are using now a days and security ...
In this paper, we address the problem of formal security verification of transport protocols for wir...
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They ...
Wireless sensor networks consist of a large amount of sensor nodes, small low-cost wireless computin...
Nodes in a sensor network may be lost due to malicious attack or either power loss. To extend the li...
The increase of the digitalization taking place in various industrial domains is leading developers ...
Wireless Sensor Networks (WSNs) are particularly prone to security attacks. However, it is well-know...
This article presents a novel approach to the analysis of wireless sensor networks (WSN) security, b...
Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public envi...
The contribution of this work is an approach for lightweight specification and verification of nesC ...
Because of their low cost, small size, low resources and self-organizing nature a Wireless Sensor Ne...
Abstract: Wireless Sensor Networks(WSNs) have been widely used in various applications. Recent advan...
Abstract- Wireless sensor networking continues to evolve as one of the most exciting and challenging...
Abstract: Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor environments, an...
When designing Wireless Sensor Networks it is important to analyze their security risks and provide ...
There are many applications of wireless sensor networks (WSNs) we are using now a days and security ...
In this paper, we address the problem of formal security verification of transport protocols for wir...
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They ...
Wireless sensor networks consist of a large amount of sensor nodes, small low-cost wireless computin...
Nodes in a sensor network may be lost due to malicious attack or either power loss. To extend the li...