A semantic analysis of key management protocols for wireless sensor networks
Gorrieri and Martinelli’s timed Generalized Non-Deducibility on Compositions (tGNDC) schema is a well-known general framework for the formal verification of security protocols in a concurrent scenario. We generalise the tGNDC schema to verify wireless network security protocols. Our generalisation r...
Uloženo v:
| Vydáno v: | Science of computer programming Ročník 81; s. 53 - 78 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier B.V
15.02.2014
|
| Témata: | |
| ISSN: | 0167-6423, 1872-7964 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Gorrieri and Martinelli’s timed Generalized Non-Deducibility on Compositions (tGNDC) schema is a well-known general framework for the formal verification of security protocols in a concurrent scenario. We generalise the tGNDC schema to verify wireless network security protocols. Our generalisation relies on a simple timed broadcasting process calculus whose operational semantics is given in terms of a labelled transition system which is used to derive a standard simulation theory. We apply our tGNDC framework to perform a security analysis of three well-known key management protocols for wireless sensor networks: μTESLA, LEAP+ and LiSP.
► We generalise Gorrieri and Martinelli’s tGNDC security framework. ► Our generalisation relies on a simple timed broadcasting process calculus. ► Our generalisation relies on a standard simulation theory. ► We apply our generalisation to verify real-world wireless networks key management protocols. |
|---|---|
| AbstractList | Gorrieri and Martinelli’s timed Generalized Non-Deducibility on Compositions (tGNDC) schema is a well-known general framework for the formal verification of security protocols in a concurrent scenario. We generalise the tGNDC schema to verify wireless network security protocols. Our generalisation relies on a simple timed broadcasting process calculus whose operational semantics is given in terms of a labelled transition system which is used to derive a standard simulation theory. We apply our tGNDC framework to perform a security analysis of three well-known key management protocols for wireless sensor networks: μTESLA, LEAP+ and LiSP.
► We generalise Gorrieri and Martinelli’s tGNDC security framework. ► Our generalisation relies on a simple timed broadcasting process calculus. ► Our generalisation relies on a standard simulation theory. ► We apply our generalisation to verify real-world wireless networks key management protocols. |
| Author | Macedonio, Damiano Merro, Massimo |
| Author_xml | – sequence: 1 givenname: Damiano surname: Macedonio fullname: Macedonio, Damiano – sequence: 2 givenname: Massimo surname: Merro fullname: Merro, Massimo email: massimo.merro@univr.it, massimo.merro@gmail.com |
| BookMark | eNqFkE1LAzEQhoNUsK3-Ai_5A7vObHaT7sFDKX5BwYueQ5rOStptUpJg6b93az150NPwDu8zMM-EjXzwxNgtQomA8m5TJutsKCtAUQKWAM0FG-NMVYVqZT1i46GlCllX4opNUtoAgKwVjtlyzhPtjM_OcuNNf0wu8dDxLR35sDYftCOf-T6GHGzoE-9C5AcXqaeUBtSnIXvKhxC36ZpddqZPdPMzp-z98eFt8VwsX59eFvNlYQWIXMxqMGibSqEwVEMHsIJGKFRyjRJMu4KurVtsrKJmhZUUKFeNkjMSjewQjJgycb5rY0gpUqf30e1MPGoEfRKiN_pbiD4J0YB6EDJQ7S_KumyyCz5H4_p_2PszS8Nbn47iqUPe0npQYbNeB_cn_wV04X9Q |
| CitedBy_id | crossref_primary_10_1016_j_camwa_2015_02_004 crossref_primary_10_1016_j_cosrev_2025_100758 crossref_primary_10_1007_s00236_018_0329_6 crossref_primary_10_1145_2821507 crossref_primary_10_1186_s13638_018_1129_y crossref_primary_10_3390_computers4030215 crossref_primary_10_1016_j_adhoc_2016_10_007 crossref_primary_10_3390_en8077279 |
| Cites_doi | 10.1007/978-1-84800-328-6 10.1016/j.scico.2004.01.001 10.3233/FI-2010-371 10.1007/s11235-008-9131-z 10.1023/A:1016598314198 10.1109/TIT.1976.1055638 10.1016/j.adhoc.2005.01.002 10.1016/j.tcs.2011.03.017 10.1145/359340.359342 10.1006/inco.1995.1041 10.1007/s10817-008-9112-7 10.1145/1015047.1015056 10.1016/j.tcs.2010.01.023 10.1145/1218556.1218559 10.1016/j.ic.2007.11.010 10.1016/j.tcs.2006.08.036 10.1145/381677.381696 |
| ContentType | Journal Article |
| Copyright | 2013 Elsevier B.V. |
| Copyright_xml | – notice: 2013 Elsevier B.V. |
| DBID | 6I. AAFTH AAYXX CITATION |
| DOI | 10.1016/j.scico.2013.01.005 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1872-7964 |
| EndPage | 78 |
| ExternalDocumentID | 10_1016_j_scico_2013_01_005 S016764231300018X |
| GrantInformation_xml | – fundername: Dipartimento di Informatica Verona |
| GroupedDBID | --K --M .DC .~1 0R~ 123 1B1 1RT 1~. 1~5 4.4 457 4G. 5VS 6I. 7-5 71M 8P~ 9JN AACTN AAEDW AAFTH AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABJNI ABMAC ABVKL ABXDB ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADHUB AEBSH AEKER AENEX AEXQZ AFKWA AFTJW AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BKOJK BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF IHE IXB J1W KOM LG9 M26 M41 MO0 N9A NCXOZ O-L O9- OAUVE OK1 OZT P-8 P-9 P2P PC. Q38 RIG ROL RPZ SDF SDG SDP SES SPC SPCBC SSV SSZ T5K TN5 XPP ZMT ~G- 9DU AAEDT AAQXK AATTM AAXKI AAYWO AAYXX ABFNM ABWVN ACLOT ACNNM ACRPL ACVFH ADCNI ADMUD ADNMO ADVLN AEIPS AEUPX AFFNX AFJKZ AFPUW AGHFR AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP ASPBG AVWKF AZFZN CITATION EFKBS FGOYB G-2 HZ~ R2- SEW WUQ ZY4 ~HD |
| ID | FETCH-LOGICAL-c303t-840a1c52713ae40f00b0537176d160a9b0f94915c7e5b126316b5768e356f10a3 |
| ISICitedReferencesCount | 19 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000331478600003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0167-6423 |
| IngestDate | Sat Nov 29 03:37:15 EST 2025 Tue Nov 18 20:53:10 EST 2025 Fri Feb 23 02:37:17 EST 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Wireless sensor network Key management protocol Security analysis Process calculus |
| Language | English |
| License | http://www.elsevier.com/open-access/userlicense/1.0 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c303t-840a1c52713ae40f00b0537176d160a9b0f94915c7e5b126316b5768e356f10a3 |
| OpenAccessLink | https://dx.doi.org/10.1016/j.scico.2013.01.005 |
| PageCount | 26 |
| ParticipantIDs | crossref_primary_10_1016_j_scico_2013_01_005 crossref_citationtrail_10_1016_j_scico_2013_01_005 elsevier_sciencedirect_doi_10_1016_j_scico_2013_01_005 |
| PublicationCentury | 2000 |
| PublicationDate | 2014-02-15 |
| PublicationDateYYYYMMDD | 2014-02-15 |
| PublicationDate_xml | – month: 02 year: 2014 text: 2014-02-15 day: 15 |
| PublicationDecade | 2010 |
| PublicationTitle | Science of computer programming |
| PublicationYear | 2014 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | A. Perrig, R. Szewczyk, V. Wen, D.E. Culler, J.D. Tygar, SPINS: security protocols for sensor netowrks, in: International Conference on Mobile Computing and Networking (MOBICOM), 2001, pp. 189–199. Focardi, Martinelli (br000080) 1999; vol. 1708 Ghassemi, Fokkink, Movaghar (br000130) 2010; 105 Luk, Mezzour, Perrig, Gligor (br000210) 2007 Song, Godskesen (br000155) 2010; vol. 323 Gallina, Rossi (br000150) 2010; vol. 323 Kouzapas, Philippou (br000160) 2011; vol. 6722 Arnaud, Cortier, Delaune (br000165) 2010 Armando, Basin, Boichut, Chevalier, Compagna, Cuéllar, Drielsma, Héam, Kouchnarenko, Mantovani, Mödersheim, von Oheimb, Rusinowitch, Santiago, Turuani, Viganò, Vigneron (br000180) 2005; vol. 3576 Johnson, Maltz (br000175) 1996 Perrig, Szewczyk, Tygar, Wen, Culler (br000005) 2002; 8 Diffiel, Hellman (br000030) 1976; 22 Tobarra, Cazorla, Cuartero, Díaz, Cambronero (br000185) 2009; 40 Ghassemi, Fokkink, Movaghar (br000135) 2011; 412 Sundararaman, Buy, Kshemkalyani (br000045) 2005; 3 Merro, Sibilio (br000140) 2010; vol. 5961 Merro (br000115) 2009; 207 Karlof, Sastry, Wagner (br000190) 2004 Papadimitratos, Haas (br000170) 2003 Lanese, Sangiorgi (br000105) 2010; 411 Nicollin, Sifakis (br000075) 1991; vol. 575 Watro, Kong, fen Cuti, Gardiner, Lynn, Kruus (br000200) 2004 Blackshear, Verma (br000215) 2010 Nipkow, Paulson, Wenzel (br000050) 2002; vol. 2283 Singh, Ramakrishnan, Smolka (br000125) 2008; vol. 5052 Rivest, Shamir, Adleman (br000035) 1978; 21 Nanz, Hankin (br000110) 2006; 367 Park, Shin (br000010) 2004; 3 Anderson, Chan, Perrig (br000025) 2004 Zhu, Setia, Jajodia (br000195) 2003 Gorrieri, Martinelli (br000060) 2004; 50 Macedonio, Merro (br000090) 2012; vol. 7226 Hennessy, Regan (br000040) 1995; 117 Lim (br000220) 2008 Milner (br000100) 1989 Godskesen, Nanz (br000145) 2009; vol. 5521 Zhu, Setia, Jajodia (br000015) 2006; 2 Godskesen (br000120) 2007; vol. 4467 Tobarra, Cazorla, Cuartero (br000205) 2007 Gorrieri, Martinelli, Petrocchi (br000065) 2008; 41 Basagni, Herrin, Bruschi, Rosti (br000020) 2001 Misra, Woungag (br000070) 2009 Ballardin, Merro (br000095) 2010; vol. 6561 Bertot (br000055) 2008; vol. 5170 Perrig (10.1016/j.scico.2013.01.005_br000005) 2002; 8 Nipkow (10.1016/j.scico.2013.01.005_br000050) 2002; vol. 2283 Nicollin (10.1016/j.scico.2013.01.005_br000075) 1991; vol. 575 Karlof (10.1016/j.scico.2013.01.005_br000190) 2004 Godskesen (10.1016/j.scico.2013.01.005_br000120) 2007; vol. 4467 Park (10.1016/j.scico.2013.01.005_br000010) 2004; 3 Gorrieri (10.1016/j.scico.2013.01.005_br000065) 2008; 41 10.1016/j.scico.2013.01.005_br000085 Singh (10.1016/j.scico.2013.01.005_br000125) 2008; vol. 5052 Johnson (10.1016/j.scico.2013.01.005_br000175) 1996 Lim (10.1016/j.scico.2013.01.005_br000220) 2008 Nanz (10.1016/j.scico.2013.01.005_br000110) 2006; 367 Gorrieri (10.1016/j.scico.2013.01.005_br000060) 2004; 50 Kouzapas (10.1016/j.scico.2013.01.005_br000160) 2011; vol. 6722 Gallina (10.1016/j.scico.2013.01.005_br000150) 2010; vol. 323 Focardi (10.1016/j.scico.2013.01.005_br000080) 1999; vol. 1708 Song (10.1016/j.scico.2013.01.005_br000155) 2010; vol. 323 Arnaud (10.1016/j.scico.2013.01.005_br000165) 2010 Bertot (10.1016/j.scico.2013.01.005_br000055) 2008; vol. 5170 Blackshear (10.1016/j.scico.2013.01.005_br000215) 2010 Merro (10.1016/j.scico.2013.01.005_br000115) 2009; 207 Zhu (10.1016/j.scico.2013.01.005_br000195) 2003 Watro (10.1016/j.scico.2013.01.005_br000200) 2004 Ballardin (10.1016/j.scico.2013.01.005_br000095) 2010; vol. 6561 Merro (10.1016/j.scico.2013.01.005_br000140) 2010; vol. 5961 Papadimitratos (10.1016/j.scico.2013.01.005_br000170) 2003 Diffiel (10.1016/j.scico.2013.01.005_br000030) 1976; 22 Hennessy (10.1016/j.scico.2013.01.005_br000040) 1995; 117 Misra (10.1016/j.scico.2013.01.005_br000070) 2009 Tobarra (10.1016/j.scico.2013.01.005_br000185) 2009; 40 Armando (10.1016/j.scico.2013.01.005_br000180) 2005; vol. 3576 Sundararaman (10.1016/j.scico.2013.01.005_br000045) 2005; 3 Godskesen (10.1016/j.scico.2013.01.005_br000145) 2009; vol. 5521 Ghassemi (10.1016/j.scico.2013.01.005_br000135) 2011; 412 Basagni (10.1016/j.scico.2013.01.005_br000020) 2001 Lanese (10.1016/j.scico.2013.01.005_br000105) 2010; 411 Ghassemi (10.1016/j.scico.2013.01.005_br000130) 2010; 105 Zhu (10.1016/j.scico.2013.01.005_br000015) 2006; 2 Anderson (10.1016/j.scico.2013.01.005_br000025) 2004 Tobarra (10.1016/j.scico.2013.01.005_br000205) 2007 Macedonio (10.1016/j.scico.2013.01.005_br000090) 2012; vol. 7226 Luk (10.1016/j.scico.2013.01.005_br000210) 2007 Rivest (10.1016/j.scico.2013.01.005_br000035) 1978; 21 Milner (10.1016/j.scico.2013.01.005_br000100) 1989 |
| References_xml | – start-page: 162 year: 2004 end-page: 175 ident: br000190 article-title: TinySec: a link layer security architecture for wireless sensor networks publication-title: International Conference on Enbedded Networked Sensor Systems (SenSys) – volume: vol. 5052 start-page: 296 year: 2008 end-page: 314 ident: br000125 article-title: A process calculus for mobile ad hoc networks publication-title: Coordination Models and Languages (COORDINATION) – volume: 105 start-page: 375 year: 2010 end-page: 415 ident: br000130 article-title: Equational reasoning on mobile ad hoc networks publication-title: Fundamenta Informaticae – start-page: 153 year: 1996 end-page: 181 ident: br000175 article-title: Dynamic source routing in ad hoc wireless networks publication-title: Mobile Computing – start-page: 59 year: 2010 end-page: 74 ident: br000165 article-title: Modeling and verifying ad hoc routing protocols publication-title: IEEE Computer Security Foundations Symposium (CSF) – volume: vol. 5961 start-page: 228 year: 2010 end-page: 243 ident: br000140 article-title: A timed calculus for wireless systems publication-title: Fundamentals of Software Engineering (FSEN) – start-page: 206 year: 2004 end-page: 215 ident: br000025 article-title: Key infection: smart trust for smart dust publication-title: IEEE International Conference on Network Protocols (ICNP) – volume: vol. 7226 start-page: 403 year: 2012 end-page: 417 ident: br000090 article-title: A semantics analysis of wireless network security protocols publication-title: NASA Formal Methods Symposium (NFM) – volume: vol. 5521 start-page: 106 year: 2009 end-page: 122 ident: br000145 article-title: Mobility models and behavioural equivalence for wireless networks publication-title: Coordination Models and Languages (COORDINATION) – start-page: 59 year: 2004 end-page: 64 ident: br000200 article-title: TinyPK: securing sensor networks with public key technology publication-title: ACM Workshop on Security of ad hoc and Sensor Networks (SASN) – volume: vol. 575 start-page: 376 year: 1991 end-page: 398 ident: br000075 article-title: An overview and synthesis on timed process algebras publication-title: International Workshop on Computer Aided Verification (CAV) – volume: 8 start-page: 521 year: 2002 end-page: 534 ident: br000005 article-title: SPINS: security protocols for sensor networks publication-title: Wireless Networks – reference: A. Perrig, R. Szewczyk, V. Wen, D.E. Culler, J.D. Tygar, SPINS: security protocols for sensor netowrks, in: International Conference on Mobile Computing and Networking (MOBICOM), 2001, pp. 189–199. – volume: 41 start-page: 325 year: 2008 end-page: 364 ident: br000065 article-title: Formal models and analysis of secure multicast in wired and wireless networks publication-title: Journal of Automated Reasoning – volume: 117 start-page: 221 year: 1995 end-page: 239 ident: br000040 article-title: A process algebra for timed systems publication-title: Information and Computation – volume: vol. 4467 start-page: 132 year: 2007 end-page: 150 ident: br000120 article-title: A calculus for mobile ad hoc networks publication-title: Coordination Models and Languages (COORDINATION) – volume: 3 start-page: 634 year: 2004 end-page: 660 ident: br000010 article-title: LiSP: a lightweight security protocol for wireless sensor networks publication-title: ACM Transactions on Embedded Computing Systems (TECS) – volume: 367 start-page: 203 year: 2006 end-page: 227 ident: br000110 article-title: A framework for security analysis of mobile wireless networks publication-title: Theoretical Computer Science – volume: 412 start-page: 3262 year: 2011 end-page: 3282 ident: br000135 article-title: Verification of mobile ad hoc networks: an algebraic approach publication-title: Theoretical Computer Science – start-page: 479 year: 2007 end-page: 488 ident: br000210 article-title: MiniSec: a secure sensor network communication architecture publication-title: International Conference on Information Processing in Sensor Networks (IPSN) – year: 2009 ident: br000070 article-title: Guide to Wireless Ad Hoc Networks, Computer Communications and Networks – volume: 2 start-page: 500 year: 2006 end-page: 528 ident: br000015 article-title: LEAP+: efficient security mechanisms for large-scale distributed sensor networks publication-title: ACM Transactions on Sensor Networks – volume: vol. 3576 start-page: 281 year: 2005 end-page: 285 ident: br000180 article-title: The AVISPA tool for the automated validation of internet security protocols and applications publication-title: International Conference on Computer Aided Verification (CAV) – volume: 50 start-page: 23 year: 2004 end-page: 49 ident: br000060 article-title: A simple framework for real-time cryptographic protocol analysis with compositional proof rules publication-title: Science of Computer Programming – volume: 207 start-page: 194 year: 2009 end-page: 208 ident: br000115 article-title: An observational theory for mobile ad hoc networks (full paper) publication-title: Information and Computation – volume: vol. 6722 start-page: 213 year: 2011 end-page: 227 ident: br000160 article-title: A process calculus for dynamic networks publication-title: Formal Techniques for Distributed Systems (FMOODS/FORTE) – start-page: 1 year: 2007 end-page: 6 ident: br000205 article-title: Formal analysis of sensor network encryption protocol (SNEP) publication-title: IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS) – volume: 22 start-page: 644 year: 1976 end-page: 654 ident: br000030 article-title: New directions in cryptography publication-title: IEEE Transactions on Information Theory – volume: 3 start-page: 281 year: 2005 end-page: 323 ident: br000045 article-title: Clock synchronization for wireless sensor networks: a survey publication-title: Ad Hoc Networks – start-page: 1985 year: 2010 end-page: 1992 ident: br000215 article-title: R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks publication-title: ACM Symposium on Applied Computing (SAC) – start-page: 376 year: 2008 end-page: 381 ident: br000220 article-title: LEAP++: a robust key establishment scheme for wireless sensor networks publication-title: IEEE International Conference on Distributed Computing Systems Workshops (ICDCS) – start-page: 379 year: 2003 end-page: 383 ident: br000170 article-title: Secure link state routing for mobile ad hoc networks publication-title: Symposium on Applications and the Internet Workshops (SAINT) – volume: vol. 5170 start-page: 12 year: 2008 end-page: 16 ident: br000055 article-title: A short presentation of Coq publication-title: International Conference on Theorem Proving in Higher Order Logics (TPHOLs 2007) – volume: 411 start-page: 1928 year: 2010 end-page: 1948 ident: br000105 article-title: An operational semantics for a calculus for wireless systems publication-title: Theoretical Computer Science – volume: vol. 2283 year: 2002 ident: br000050 publication-title: Isabelle/HOL—A Proof Assistant for Higher-Order Logic – volume: vol. 1708 start-page: 794 year: 1999 end-page: 813 ident: br000080 article-title: A uniform approach for the definition of security properties publication-title: World Congress on Formal Methods (FM) – start-page: 156 year: 2001 end-page: 163 ident: br000020 article-title: Secure pebblenets publication-title: ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) – volume: vol. 6561 start-page: 206 year: 2010 end-page: 222 ident: br000095 article-title: A calculus for the analysis of wireless network security protocols publication-title: Formal Aspects in Security and Trust (FAST) – volume: 40 start-page: 91 year: 2009 end-page: 99 ident: br000185 article-title: Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK publication-title: Telecommunication Systems – volume: 21 start-page: 120 year: 1978 end-page: 126 ident: br000035 article-title: A method for obtaining digital signatures and public-key cryptosystems publication-title: Communications of the ACM – year: 1989 ident: br000100 article-title: Communication and Concurrency – volume: vol. 323 start-page: 86 year: 2010 end-page: 100 ident: br000155 article-title: Probabilistic mobility models for mobile and wireless networks publication-title: Theoretical Computer Science—6th IFIP TC 1/WG 2.2 International Conference (IFIP TCS) – start-page: 308 year: 2003 end-page: 309 ident: br000195 article-title: LEAP—efficient security mechanisms for large-scale distributed sensor networks publication-title: International Conference on Enbedded Networked Sensor Systems (SenSys) – volume: vol. 323 start-page: 20 year: 2010 end-page: 31 ident: br000150 article-title: A calculus for power-aware multicast communications in ad hoc networks publication-title: Theoretical Computer Science—6th IFIP TC 1/WG 2.2 International Conference (IFIP TCS) – year: 2009 ident: 10.1016/j.scico.2013.01.005_br000070 doi: 10.1007/978-1-84800-328-6 – year: 1989 ident: 10.1016/j.scico.2013.01.005_br000100 – volume: 50 start-page: 23 issue: 1–3 year: 2004 ident: 10.1016/j.scico.2013.01.005_br000060 article-title: A simple framework for real-time cryptographic protocol analysis with compositional proof rules publication-title: Science of Computer Programming doi: 10.1016/j.scico.2004.01.001 – volume: 105 start-page: 375 issue: 4 year: 2010 ident: 10.1016/j.scico.2013.01.005_br000130 article-title: Equational reasoning on mobile ad hoc networks publication-title: Fundamenta Informaticae doi: 10.3233/FI-2010-371 – volume: 40 start-page: 91 issue: 3–4 year: 2009 ident: 10.1016/j.scico.2013.01.005_br000185 article-title: Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK publication-title: Telecommunication Systems doi: 10.1007/s11235-008-9131-z – start-page: 379 year: 2003 ident: 10.1016/j.scico.2013.01.005_br000170 article-title: Secure link state routing for mobile ad hoc networks – start-page: 1 year: 2007 ident: 10.1016/j.scico.2013.01.005_br000205 article-title: Formal analysis of sensor network encryption protocol (SNEP) – volume: 8 start-page: 521 issue: 5 year: 2002 ident: 10.1016/j.scico.2013.01.005_br000005 article-title: SPINS: security protocols for sensor networks publication-title: Wireless Networks doi: 10.1023/A:1016598314198 – volume: vol. 323 start-page: 20 year: 2010 ident: 10.1016/j.scico.2013.01.005_br000150 article-title: A calculus for power-aware multicast communications in ad hoc networks – volume: vol. 3576 start-page: 281 year: 2005 ident: 10.1016/j.scico.2013.01.005_br000180 article-title: The AVISPA tool for the automated validation of internet security protocols and applications – volume: vol. 575 start-page: 376 year: 1991 ident: 10.1016/j.scico.2013.01.005_br000075 article-title: An overview and synthesis on timed process algebras – start-page: 376 year: 2008 ident: 10.1016/j.scico.2013.01.005_br000220 article-title: LEAP++: a robust key establishment scheme for wireless sensor networks – start-page: 206 year: 2004 ident: 10.1016/j.scico.2013.01.005_br000025 article-title: Key infection: smart trust for smart dust – start-page: 153 year: 1996 ident: 10.1016/j.scico.2013.01.005_br000175 article-title: Dynamic source routing in ad hoc wireless networks – volume: 22 start-page: 644 issue: 6 year: 1976 ident: 10.1016/j.scico.2013.01.005_br000030 article-title: New directions in cryptography publication-title: IEEE Transactions on Information Theory doi: 10.1109/TIT.1976.1055638 – volume: 3 start-page: 281 issue: 3 year: 2005 ident: 10.1016/j.scico.2013.01.005_br000045 article-title: Clock synchronization for wireless sensor networks: a survey publication-title: Ad Hoc Networks doi: 10.1016/j.adhoc.2005.01.002 – volume: vol. 7226 start-page: 403 year: 2012 ident: 10.1016/j.scico.2013.01.005_br000090 article-title: A semantics analysis of wireless network security protocols – volume: 412 start-page: 3262 issue: 28 year: 2011 ident: 10.1016/j.scico.2013.01.005_br000135 article-title: Verification of mobile ad hoc networks: an algebraic approach publication-title: Theoretical Computer Science doi: 10.1016/j.tcs.2011.03.017 – volume: 21 start-page: 120 issue: 2 year: 1978 ident: 10.1016/j.scico.2013.01.005_br000035 article-title: A method for obtaining digital signatures and public-key cryptosystems publication-title: Communications of the ACM doi: 10.1145/359340.359342 – volume: vol. 6561 start-page: 206 year: 2010 ident: 10.1016/j.scico.2013.01.005_br000095 article-title: A calculus for the analysis of wireless network security protocols – volume: 117 start-page: 221 issue: 2 year: 1995 ident: 10.1016/j.scico.2013.01.005_br000040 article-title: A process algebra for timed systems publication-title: Information and Computation doi: 10.1006/inco.1995.1041 – volume: vol. 6722 start-page: 213 year: 2011 ident: 10.1016/j.scico.2013.01.005_br000160 article-title: A process calculus for dynamic networks – start-page: 479 year: 2007 ident: 10.1016/j.scico.2013.01.005_br000210 article-title: MiniSec: a secure sensor network communication architecture – volume: vol. 5961 start-page: 228 year: 2010 ident: 10.1016/j.scico.2013.01.005_br000140 article-title: A timed calculus for wireless systems – volume: vol. 323 start-page: 86 year: 2010 ident: 10.1016/j.scico.2013.01.005_br000155 article-title: Probabilistic mobility models for mobile and wireless networks – volume: 41 start-page: 325 issue: 3–4 year: 2008 ident: 10.1016/j.scico.2013.01.005_br000065 article-title: Formal models and analysis of secure multicast in wired and wireless networks publication-title: Journal of Automated Reasoning doi: 10.1007/s10817-008-9112-7 – volume: 3 start-page: 634 issue: 3 year: 2004 ident: 10.1016/j.scico.2013.01.005_br000010 article-title: LiSP: a lightweight security protocol for wireless sensor networks publication-title: ACM Transactions on Embedded Computing Systems (TECS) doi: 10.1145/1015047.1015056 – volume: vol. 5521 start-page: 106 year: 2009 ident: 10.1016/j.scico.2013.01.005_br000145 article-title: Mobility models and behavioural equivalence for wireless networks – start-page: 162 year: 2004 ident: 10.1016/j.scico.2013.01.005_br000190 article-title: TinySec: a link layer security architecture for wireless sensor networks – start-page: 1985 year: 2010 ident: 10.1016/j.scico.2013.01.005_br000215 article-title: R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks – volume: vol. 2283 year: 2002 ident: 10.1016/j.scico.2013.01.005_br000050 – volume: 411 start-page: 1928 year: 2010 ident: 10.1016/j.scico.2013.01.005_br000105 article-title: An operational semantics for a calculus for wireless systems publication-title: Theoretical Computer Science doi: 10.1016/j.tcs.2010.01.023 – volume: 2 start-page: 500 issue: 4 year: 2006 ident: 10.1016/j.scico.2013.01.005_br000015 article-title: LEAP+: efficient security mechanisms for large-scale distributed sensor networks publication-title: ACM Transactions on Sensor Networks doi: 10.1145/1218556.1218559 – volume: 207 start-page: 194 issue: 2 year: 2009 ident: 10.1016/j.scico.2013.01.005_br000115 article-title: An observational theory for mobile ad hoc networks (full paper) publication-title: Information and Computation doi: 10.1016/j.ic.2007.11.010 – volume: vol. 4467 start-page: 132 year: 2007 ident: 10.1016/j.scico.2013.01.005_br000120 article-title: A calculus for mobile ad hoc networks – start-page: 308 year: 2003 ident: 10.1016/j.scico.2013.01.005_br000195 article-title: LEAP—efficient security mechanisms for large-scale distributed sensor networks – volume: vol. 5170 start-page: 12 year: 2008 ident: 10.1016/j.scico.2013.01.005_br000055 article-title: A short presentation of Coq – volume: 367 start-page: 203 issue: 1–2 year: 2006 ident: 10.1016/j.scico.2013.01.005_br000110 article-title: A framework for security analysis of mobile wireless networks publication-title: Theoretical Computer Science doi: 10.1016/j.tcs.2006.08.036 – volume: vol. 1708 start-page: 794 year: 1999 ident: 10.1016/j.scico.2013.01.005_br000080 article-title: A uniform approach for the definition of security properties – volume: vol. 5052 start-page: 296 year: 2008 ident: 10.1016/j.scico.2013.01.005_br000125 article-title: A process calculus for mobile ad hoc networks – ident: 10.1016/j.scico.2013.01.005_br000085 doi: 10.1145/381677.381696 – start-page: 59 year: 2010 ident: 10.1016/j.scico.2013.01.005_br000165 article-title: Modeling and verifying ad hoc routing protocols – start-page: 156 year: 2001 ident: 10.1016/j.scico.2013.01.005_br000020 article-title: Secure pebblenets – start-page: 59 year: 2004 ident: 10.1016/j.scico.2013.01.005_br000200 article-title: TinyPK: securing sensor networks with public key technology |
| SSID | ssj0006471 |
| Score | 2.1548295 |
| Snippet | Gorrieri and Martinelli’s timed Generalized Non-Deducibility on Compositions (tGNDC) schema is a well-known general framework for the formal verification of... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 53 |
| SubjectTerms | Key management protocol Process calculus Security analysis Wireless sensor network |
| Title | A semantic analysis of key management protocols for wireless sensor networks |
| URI | https://dx.doi.org/10.1016/j.scico.2013.01.005 |
| Volume | 81 |
| WOSCitedRecordID | wos000331478600003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1872-7964 dateEnd: 20180131 omitProxy: false ssIdentifier: ssj0006471 issn: 0167-6423 databaseCode: AIEXJ dateStart: 19950201 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NS8MwGA6iHrz4LX6TgzctJE2btschiooODxN2K02bgOLasU7x5_vmqxsqQw9eytau6db32fuRPnlehM4ErwqVijCoFC2CSPI4EFymAcRWJiKIt7IkptlE0u-nw2H26AQVWtNOIKnr9OMjG_-rqWEfGFsvnf2DubtBYQe8BqPDFswO218ZvnfeyhHcLyPEOlMcgT-ro6qax_9an6EBEBg5hnMtWPyqfV4LVS28ry05vJ1PXb0XcDx03QrCs7tGPv7ZqW1ZgaNoLGN-BPBrumNyYpfVPEDKDiCZn3KgkWYp20WXfhYSvCsULmzejdrOK84PWgFgF1Ftj55vvtpOG7xAFQ-Y1yQ7ZgRUSTwLTf5x_JeI1fEIPUXtJTeD5HqQnNDcqNquhEmcga9e6d1eDe-68MxtFd79Bi9FZUh_377Lz-nKXAoy2ETrrnbAPWvzLbQk62204ftyYGegHXTfwx4C2EMANwoDBPAMAriDAAYIYA8BbCGAPQR20dP11eDyJnBdM4IS0pFpABV7Qcs4TCgrZEQUIUJr9tCEV5STIhNEZVFG4zKRsaAhZ5QLXXRKFnNFScH20HLd1HIfYRVnFa8qkWQli5SshCxYChmmZKWCA_IAhf7m5KWTlNedTV7zBYY5QBfdSWOrqLL449zf9dwlhTbZywFHi048_Nt1jtDaDOrHaHk6eZMnaLV8nz63k1MHok9B-4cV |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+semantic+analysis+of+key+management+protocols+for+wireless+sensor+networks&rft.jtitle=Science+of+computer+programming&rft.au=Macedonio%2C+Damiano&rft.au=Merro%2C+Massimo&rft.date=2014-02-15&rft.issn=0167-6423&rft.volume=81&rft.spage=53&rft.epage=78&rft_id=info:doi/10.1016%2Fj.scico.2013.01.005&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_scico_2013_01_005 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-6423&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-6423&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-6423&client=summon |