Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
METADATA ONLY
Loading...
Author / Producer
Date
2009
Publication Type
Conference Paper
ETH Bibliography
yes
Citations
Altmetric
METADATA ONLY
Data
Rights / License
Abstract
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium used and the distance traveled. All agents, including intruders, are subject to these constraints and this results in a distributed intruder with restricted, but more realistic, communication capabilities than those of the standard Dolev-Yao intruder. We have formalized our model in Isabelle/HOL and used it to verify protocols for authenticated ranging, distance bounding, and broadcast authentication based on delayed key disclosure.
Permanent link
Publication status
published
External links
Editor
Book title
2009 22nd IEEE Computer Security Foundations Symposium
Journal / series
Volume
Pages / Article No.
109 - 123
Publisher
IEEE
Event
22nd IEEE Computer Security Foundations Symposium (CSF 2009)
Edition / version
Methods
Software
Geographic location
Date collected
Date created
Subject
Formal Security Model; Isabelle/HOL; Security Protocols; Wireless Network Protocols
Organisational unit
03634 - Basin, David / Basin, David
03755 - Capkun, Srdan / Capkun, Srdan