Title :
Security analysis of Robust User Authentication Protocol
Author :
Pura, Mihai-Lica ; Patriciu, Victor-Valeriu
Author_Institution :
Dept. of Mil. Inf. & Math., Mil. Tech. Acad., Bucharest, Romania
Abstract :
Ad hoc networks are a promising technology for implementing the ubiquitous computing paradigm. And, as in any other domain, security is a very important aspect. Authentication, as a first security goal to be achieved, has been targeted by many protocol propositions. But in order to use an implementation of such a protocol in a real situation, its security properties must be proved. Formal verification through model checking is a technique that can perform this demonstration with high accuracy. We present the use of formal verification over a protocol proposed for wireless sensor networks in order to correctly authenticate the user before allowing him to access the services of the network. Casper/FDR2 approach was used with success in proving that the desired security properties of the protocol were verified.
Keywords :
formal verification; protocols; security of data; ubiquitous computing; Ad hoc network; Casper/FDR2 approach; formal verification; robust user authentication protocol; security analysis; ubiquitous computing paradigm; wireless sensor networks; Ad hoc networks; Authentication; Formal verification; Informatics; Mathematics; Military computing; Robustness; Security; Wireless application protocol; Wireless sensor networks; Casper; FDR2; ad hoc network; formal verification; model checking; wireless sensor network;
Conference_Titel :
Communications (COMM), 2010 8th International Conference on
Conference_Location :
Bucharest
Print_ISBN :
978-1-4244-6360-2
DOI :
10.1109/ICCOMM.2010.5509078