Verifying Sensor Network Security Protocol Implementations

Verifying Sensor Network Security Protocol Implementations

4.11 - 1251 ratings - Source

Verifying sensor network security protocol implementations using testing/simulation might leave some flaws undetected. Formal verification techniques have been very successful in detecting faults in security protocol specifications; however, they generally require building a formal description (model) of the protocol. Building accurate models is hard, thus hindering the application of formal verification. In this work, a framework for automating formal verification of sensor network security protocols is presented. The framework Slede extracts models from protocol implementations and verifies them against generated intruder models. Slede was evaluated by verifying two sensor network security protocol implementations. Security flaws in both protocols were detected.hoc On Demand Distance Vector) protocol [42], a loop-free routing protocol for ad -hoc networks that guarantees that the network is always free of loops. ... The main benefit of model checking over verification techniques like simulating using TOSSIM and manual inspection is that the ... of the system by checking satisfiability of the requirement through every branch of the model representing the system.

Title:Verifying Sensor Network Security Protocol Implementations
Publisher:ProQuest - 2008

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA