DocumentCode
3258367
Title
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
Author
Schaller, Patrick ; Schmidt, Benedikt ; Basin, David ; Capkun, Srdjan
Author_Institution
ETH Zurich, Zurich, Switzerland
fYear
2009
fDate
8-10 July 2009
Firstpage
109
Lastpage
123
Abstract
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium used and the distance traveled. All agents, including intruders, are subject to these constraints and this results in a distributed intruder with restricted, but more realistic, communication capabilities than those of the standard Dolev-Yao intruder. We have formalized our model in Isabelle/HOL and used it to verify protocols for authenticated ranging, distance bounding, and broadcast authentication based on delayed key disclosure.
Keywords
telecommunication network routing; telecommunication network topology; telecommunication security; authenticated ranging; broadcast authentication; delayed key disclosure; distance bounding; security protocols; wireless networks; Authentication; Broadcasting; Clocks; Communication standards; Communications technology; Computer security; Cryptography; Synchronization; Wireless application protocol; Wireless networks; Formal Security Model; Isabelle/HOL; Security Protocols; Wireless Network Protocols;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Foundations Symposium, 2009. CSF '09. 22nd IEEE
Conference_Location
Port Jefferson, NY
ISSN
1940-1434
Print_ISBN
978-0-7695-3712-2
Type
conf
DOI
10.1109/CSF.2009.6
Filename
5230621
Link To Document