Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks


METADATA ONLY
Loading...

Date

2009

Publication Type

Conference Paper

ETH Bibliography

yes

Citations

Altmetric
METADATA ONLY

Data

Rights / License

Abstract

We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium used and the distance traveled. All agents, including intruders, are subject to these constraints and this results in a distributed intruder with restricted, but more realistic, communication capabilities than those of the standard Dolev-Yao intruder. We have formalized our model in Isabelle/HOL and used it to verify protocols for authenticated ranging, distance bounding, and broadcast authentication based on delayed key disclosure.

Publication status

published

Editor

Book title

2009 22nd IEEE Computer Security Foundations Symposium

Journal / series

Volume

Pages / Article No.

109 - 123

Publisher

IEEE

Event

22nd IEEE Computer Security Foundations Symposium (CSF 2009)

Edition / version

Methods

Software

Geographic location

Date collected

Date created

Subject

Formal Security Model; Isabelle/HOL; Security Protocols; Wireless Network Protocols

Organisational unit

03634 - Basin, David / Basin, David check_circle
03755 - Capkun, Srdan / Capkun, Srdan check_circle

Notes

Funding

Related publications and datasets