Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks

Open access
Date
2012Type
- Report
ETH Bibliography
yes
Altmetrics
Abstract
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium used and the distance traveled. All agents, including intruders, are subject to these constraints and this results in a distributed intruder with restricted, but more realistic, communication capabilities than the standard Dolev-Yao intruder. We have formalized our model in Isabelle/HOL and used it to verify protocols for authenticated ranging, distance bounding, and broadcast authentication based on delayed key disclosure. Show more
Permanent link
https://doi.org/10.3929/ethz-a-006821912Publication status
publishedJournal / series
Technical Report / ETH Zurich, Department of Computer ScienceVolume
Publisher
Eidgenössische Technische Hochschule Zürich, Department of Computer ScienceSubject
VERIFICATION (SOFTWARE ENGINEERING); MOBILFUNKNETZE + DRAHTLOSE NACHRICHTENNETZE (NACHRICHTENTECHNIK); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); VERIFIKATION (SOFTWARE ENGINEERING); MOBILE RADIO NETWORKS + WIRELESS COMMUNICATIONS NETWORKS (TELECOMMUNICATIONS); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)Organisational unit
03755 - Capkun, Srdan / Capkun, Srdan
02150 - Dep. Informatik / Dep. of Computer Science
03634 - Basin, David / Basin, David
More
Show all metadata
ETH Bibliography
yes
Altmetrics