A semantic analysis of key management protocols for wireless sensor networks

Gorrieri and Martinelli’s timed Generalized Non-Deducibility on Compositions (tGNDC) schema is a well-known general framework for the formal verification of security protocols in a concurrent scenario. We generalise the tGNDC schema to verify wireless network security protocols. Our generalisation r...

Full description

Saved in:
Bibliographic Details
Published in:Science of computer programming Vol. 81; pp. 53 - 78
Main Authors: Macedonio, Damiano, Merro, Massimo
Format: Journal Article
Language:English
Published: Elsevier B.V 15.02.2014
Subjects:
ISSN:0167-6423, 1872-7964
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Gorrieri and Martinelli’s timed Generalized Non-Deducibility on Compositions (tGNDC) schema is a well-known general framework for the formal verification of security protocols in a concurrent scenario. We generalise the tGNDC schema to verify wireless network security protocols. Our generalisation relies on a simple timed broadcasting process calculus whose operational semantics is given in terms of a labelled transition system which is used to derive a standard simulation theory. We apply our tGNDC framework to perform a security analysis of three well-known key management protocols for wireless sensor networks: μTESLA, LEAP+ and LiSP. ► We generalise Gorrieri and Martinelli’s tGNDC security framework. ► Our generalisation relies on a simple timed broadcasting process calculus. ► Our generalisation relies on a standard simulation theory. ► We apply our generalisation to verify real-world wireless networks key management protocols.
AbstractList Gorrieri and Martinelli’s timed Generalized Non-Deducibility on Compositions (tGNDC) schema is a well-known general framework for the formal verification of security protocols in a concurrent scenario. We generalise the tGNDC schema to verify wireless network security protocols. Our generalisation relies on a simple timed broadcasting process calculus whose operational semantics is given in terms of a labelled transition system which is used to derive a standard simulation theory. We apply our tGNDC framework to perform a security analysis of three well-known key management protocols for wireless sensor networks: μTESLA, LEAP+ and LiSP. ► We generalise Gorrieri and Martinelli’s tGNDC security framework. ► Our generalisation relies on a simple timed broadcasting process calculus. ► Our generalisation relies on a standard simulation theory. ► We apply our generalisation to verify real-world wireless networks key management protocols.
Author Macedonio, Damiano
Merro, Massimo
Author_xml – sequence: 1
  givenname: Damiano
  surname: Macedonio
  fullname: Macedonio, Damiano
– sequence: 2
  givenname: Massimo
  surname: Merro
  fullname: Merro, Massimo
  email: massimo.merro@univr.it, massimo.merro@gmail.com
BookMark eNqFkE1LAzEQhoNUsK3-Ai_5A7vObHaT7sFDKX5BwYueQ5rOStptUpJg6b93az150NPwDu8zMM-EjXzwxNgtQomA8m5TJutsKCtAUQKWAM0FG-NMVYVqZT1i46GlCllX4opNUtoAgKwVjtlyzhPtjM_OcuNNf0wu8dDxLR35sDYftCOf-T6GHGzoE-9C5AcXqaeUBtSnIXvKhxC36ZpddqZPdPMzp-z98eFt8VwsX59eFvNlYQWIXMxqMGibSqEwVEMHsIJGKFRyjRJMu4KurVtsrKJmhZUUKFeNkjMSjewQjJgycb5rY0gpUqf30e1MPGoEfRKiN_pbiD4J0YB6EDJQ7S_KumyyCz5H4_p_2PszS8Nbn47iqUPe0npQYbNeB_cn_wV04X9Q
CitedBy_id crossref_primary_10_1016_j_camwa_2015_02_004
crossref_primary_10_1016_j_cosrev_2025_100758
crossref_primary_10_1007_s00236_018_0329_6
crossref_primary_10_1145_2821507
crossref_primary_10_1186_s13638_018_1129_y
crossref_primary_10_3390_computers4030215
crossref_primary_10_1016_j_adhoc_2016_10_007
crossref_primary_10_3390_en8077279
Cites_doi 10.1007/978-1-84800-328-6
10.1016/j.scico.2004.01.001
10.3233/FI-2010-371
10.1007/s11235-008-9131-z
10.1023/A:1016598314198
10.1109/TIT.1976.1055638
10.1016/j.adhoc.2005.01.002
10.1016/j.tcs.2011.03.017
10.1145/359340.359342
10.1006/inco.1995.1041
10.1007/s10817-008-9112-7
10.1145/1015047.1015056
10.1016/j.tcs.2010.01.023
10.1145/1218556.1218559
10.1016/j.ic.2007.11.010
10.1016/j.tcs.2006.08.036
10.1145/381677.381696
ContentType Journal Article
Copyright 2013 Elsevier B.V.
Copyright_xml – notice: 2013 Elsevier B.V.
DBID 6I.
AAFTH
AAYXX
CITATION
DOI 10.1016/j.scico.2013.01.005
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-7964
EndPage 78
ExternalDocumentID 10_1016_j_scico_2013_01_005
S016764231300018X
GrantInformation_xml – fundername: Dipartimento di Informatica Verona
GroupedDBID --K
--M
.DC
.~1
0R~
123
1B1
1RT
1~.
1~5
4.4
457
4G.
5VS
6I.
7-5
71M
8P~
9JN
AACTN
AAEDW
AAFTH
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABJNI
ABMAC
ABVKL
ABXDB
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
AEBSH
AEKER
AENEX
AEXQZ
AFKWA
AFTJW
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
AXJTR
BKOJK
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
IHE
IXB
J1W
KOM
LG9
M26
M41
MO0
N9A
NCXOZ
O-L
O9-
OAUVE
OK1
OZT
P-8
P-9
P2P
PC.
Q38
RIG
ROL
RPZ
SDF
SDG
SDP
SES
SPC
SPCBC
SSV
SSZ
T5K
TN5
XPP
ZMT
~G-
9DU
AAEDT
AAQXK
AATTM
AAXKI
AAYWO
AAYXX
ABFNM
ABWVN
ACLOT
ACNNM
ACRPL
ACVFH
ADCNI
ADMUD
ADNMO
ADVLN
AEIPS
AEUPX
AFFNX
AFJKZ
AFPUW
AGHFR
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
ASPBG
AVWKF
AZFZN
CITATION
EFKBS
FGOYB
G-2
HZ~
R2-
SEW
WUQ
ZY4
~HD
ID FETCH-LOGICAL-c303t-840a1c52713ae40f00b0537176d160a9b0f94915c7e5b126316b5768e356f10a3
ISICitedReferencesCount 19
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000331478600003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0167-6423
IngestDate Sat Nov 29 03:37:15 EST 2025
Tue Nov 18 20:53:10 EST 2025
Fri Feb 23 02:37:17 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Wireless sensor network
Key management protocol
Security analysis
Process calculus
Language English
License http://www.elsevier.com/open-access/userlicense/1.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c303t-840a1c52713ae40f00b0537176d160a9b0f94915c7e5b126316b5768e356f10a3
OpenAccessLink https://dx.doi.org/10.1016/j.scico.2013.01.005
PageCount 26
ParticipantIDs crossref_primary_10_1016_j_scico_2013_01_005
crossref_citationtrail_10_1016_j_scico_2013_01_005
elsevier_sciencedirect_doi_10_1016_j_scico_2013_01_005
PublicationCentury 2000
PublicationDate 2014-02-15
PublicationDateYYYYMMDD 2014-02-15
PublicationDate_xml – month: 02
  year: 2014
  text: 2014-02-15
  day: 15
PublicationDecade 2010
PublicationTitle Science of computer programming
PublicationYear 2014
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References A. Perrig, R. Szewczyk, V. Wen, D.E. Culler, J.D. Tygar, SPINS: security protocols for sensor netowrks, in: International Conference on Mobile Computing and Networking (MOBICOM), 2001, pp. 189–199.
Focardi, Martinelli (br000080) 1999; vol. 1708
Ghassemi, Fokkink, Movaghar (br000130) 2010; 105
Luk, Mezzour, Perrig, Gligor (br000210) 2007
Song, Godskesen (br000155) 2010; vol. 323
Gallina, Rossi (br000150) 2010; vol. 323
Kouzapas, Philippou (br000160) 2011; vol. 6722
Arnaud, Cortier, Delaune (br000165) 2010
Armando, Basin, Boichut, Chevalier, Compagna, Cuéllar, Drielsma, Héam, Kouchnarenko, Mantovani, Mödersheim, von Oheimb, Rusinowitch, Santiago, Turuani, Viganò, Vigneron (br000180) 2005; vol. 3576
Johnson, Maltz (br000175) 1996
Perrig, Szewczyk, Tygar, Wen, Culler (br000005) 2002; 8
Diffiel, Hellman (br000030) 1976; 22
Tobarra, Cazorla, Cuartero, Díaz, Cambronero (br000185) 2009; 40
Ghassemi, Fokkink, Movaghar (br000135) 2011; 412
Sundararaman, Buy, Kshemkalyani (br000045) 2005; 3
Merro, Sibilio (br000140) 2010; vol. 5961
Merro (br000115) 2009; 207
Karlof, Sastry, Wagner (br000190) 2004
Papadimitratos, Haas (br000170) 2003
Lanese, Sangiorgi (br000105) 2010; 411
Nicollin, Sifakis (br000075) 1991; vol. 575
Watro, Kong, fen Cuti, Gardiner, Lynn, Kruus (br000200) 2004
Blackshear, Verma (br000215) 2010
Nipkow, Paulson, Wenzel (br000050) 2002; vol. 2283
Singh, Ramakrishnan, Smolka (br000125) 2008; vol. 5052
Rivest, Shamir, Adleman (br000035) 1978; 21
Nanz, Hankin (br000110) 2006; 367
Park, Shin (br000010) 2004; 3
Anderson, Chan, Perrig (br000025) 2004
Zhu, Setia, Jajodia (br000195) 2003
Gorrieri, Martinelli (br000060) 2004; 50
Macedonio, Merro (br000090) 2012; vol. 7226
Hennessy, Regan (br000040) 1995; 117
Lim (br000220) 2008
Milner (br000100) 1989
Godskesen, Nanz (br000145) 2009; vol. 5521
Zhu, Setia, Jajodia (br000015) 2006; 2
Godskesen (br000120) 2007; vol. 4467
Tobarra, Cazorla, Cuartero (br000205) 2007
Gorrieri, Martinelli, Petrocchi (br000065) 2008; 41
Basagni, Herrin, Bruschi, Rosti (br000020) 2001
Misra, Woungag (br000070) 2009
Ballardin, Merro (br000095) 2010; vol. 6561
Bertot (br000055) 2008; vol. 5170
Perrig (10.1016/j.scico.2013.01.005_br000005) 2002; 8
Nipkow (10.1016/j.scico.2013.01.005_br000050) 2002; vol. 2283
Nicollin (10.1016/j.scico.2013.01.005_br000075) 1991; vol. 575
Karlof (10.1016/j.scico.2013.01.005_br000190) 2004
Godskesen (10.1016/j.scico.2013.01.005_br000120) 2007; vol. 4467
Park (10.1016/j.scico.2013.01.005_br000010) 2004; 3
Gorrieri (10.1016/j.scico.2013.01.005_br000065) 2008; 41
10.1016/j.scico.2013.01.005_br000085
Singh (10.1016/j.scico.2013.01.005_br000125) 2008; vol. 5052
Johnson (10.1016/j.scico.2013.01.005_br000175) 1996
Lim (10.1016/j.scico.2013.01.005_br000220) 2008
Nanz (10.1016/j.scico.2013.01.005_br000110) 2006; 367
Gorrieri (10.1016/j.scico.2013.01.005_br000060) 2004; 50
Kouzapas (10.1016/j.scico.2013.01.005_br000160) 2011; vol. 6722
Gallina (10.1016/j.scico.2013.01.005_br000150) 2010; vol. 323
Focardi (10.1016/j.scico.2013.01.005_br000080) 1999; vol. 1708
Song (10.1016/j.scico.2013.01.005_br000155) 2010; vol. 323
Arnaud (10.1016/j.scico.2013.01.005_br000165) 2010
Bertot (10.1016/j.scico.2013.01.005_br000055) 2008; vol. 5170
Blackshear (10.1016/j.scico.2013.01.005_br000215) 2010
Merro (10.1016/j.scico.2013.01.005_br000115) 2009; 207
Zhu (10.1016/j.scico.2013.01.005_br000195) 2003
Watro (10.1016/j.scico.2013.01.005_br000200) 2004
Ballardin (10.1016/j.scico.2013.01.005_br000095) 2010; vol. 6561
Merro (10.1016/j.scico.2013.01.005_br000140) 2010; vol. 5961
Papadimitratos (10.1016/j.scico.2013.01.005_br000170) 2003
Diffiel (10.1016/j.scico.2013.01.005_br000030) 1976; 22
Hennessy (10.1016/j.scico.2013.01.005_br000040) 1995; 117
Misra (10.1016/j.scico.2013.01.005_br000070) 2009
Tobarra (10.1016/j.scico.2013.01.005_br000185) 2009; 40
Armando (10.1016/j.scico.2013.01.005_br000180) 2005; vol. 3576
Sundararaman (10.1016/j.scico.2013.01.005_br000045) 2005; 3
Godskesen (10.1016/j.scico.2013.01.005_br000145) 2009; vol. 5521
Ghassemi (10.1016/j.scico.2013.01.005_br000135) 2011; 412
Basagni (10.1016/j.scico.2013.01.005_br000020) 2001
Lanese (10.1016/j.scico.2013.01.005_br000105) 2010; 411
Ghassemi (10.1016/j.scico.2013.01.005_br000130) 2010; 105
Zhu (10.1016/j.scico.2013.01.005_br000015) 2006; 2
Anderson (10.1016/j.scico.2013.01.005_br000025) 2004
Tobarra (10.1016/j.scico.2013.01.005_br000205) 2007
Macedonio (10.1016/j.scico.2013.01.005_br000090) 2012; vol. 7226
Luk (10.1016/j.scico.2013.01.005_br000210) 2007
Rivest (10.1016/j.scico.2013.01.005_br000035) 1978; 21
Milner (10.1016/j.scico.2013.01.005_br000100) 1989
References_xml – start-page: 162
  year: 2004
  end-page: 175
  ident: br000190
  article-title: TinySec: a link layer security architecture for wireless sensor networks
  publication-title: International Conference on Enbedded Networked Sensor Systems (SenSys)
– volume: vol. 5052
  start-page: 296
  year: 2008
  end-page: 314
  ident: br000125
  article-title: A process calculus for mobile ad hoc networks
  publication-title: Coordination Models and Languages (COORDINATION)
– volume: 105
  start-page: 375
  year: 2010
  end-page: 415
  ident: br000130
  article-title: Equational reasoning on mobile ad hoc networks
  publication-title: Fundamenta Informaticae
– start-page: 153
  year: 1996
  end-page: 181
  ident: br000175
  article-title: Dynamic source routing in ad hoc wireless networks
  publication-title: Mobile Computing
– start-page: 59
  year: 2010
  end-page: 74
  ident: br000165
  article-title: Modeling and verifying ad hoc routing protocols
  publication-title: IEEE Computer Security Foundations Symposium (CSF)
– volume: vol. 5961
  start-page: 228
  year: 2010
  end-page: 243
  ident: br000140
  article-title: A timed calculus for wireless systems
  publication-title: Fundamentals of Software Engineering (FSEN)
– start-page: 206
  year: 2004
  end-page: 215
  ident: br000025
  article-title: Key infection: smart trust for smart dust
  publication-title: IEEE International Conference on Network Protocols (ICNP)
– volume: vol. 7226
  start-page: 403
  year: 2012
  end-page: 417
  ident: br000090
  article-title: A semantics analysis of wireless network security protocols
  publication-title: NASA Formal Methods Symposium (NFM)
– volume: vol. 5521
  start-page: 106
  year: 2009
  end-page: 122
  ident: br000145
  article-title: Mobility models and behavioural equivalence for wireless networks
  publication-title: Coordination Models and Languages (COORDINATION)
– start-page: 59
  year: 2004
  end-page: 64
  ident: br000200
  article-title: TinyPK: securing sensor networks with public key technology
  publication-title: ACM Workshop on Security of ad hoc and Sensor Networks (SASN)
– volume: vol. 575
  start-page: 376
  year: 1991
  end-page: 398
  ident: br000075
  article-title: An overview and synthesis on timed process algebras
  publication-title: International Workshop on Computer Aided Verification (CAV)
– volume: 8
  start-page: 521
  year: 2002
  end-page: 534
  ident: br000005
  article-title: SPINS: security protocols for sensor networks
  publication-title: Wireless Networks
– reference: A. Perrig, R. Szewczyk, V. Wen, D.E. Culler, J.D. Tygar, SPINS: security protocols for sensor netowrks, in: International Conference on Mobile Computing and Networking (MOBICOM), 2001, pp. 189–199.
– volume: 41
  start-page: 325
  year: 2008
  end-page: 364
  ident: br000065
  article-title: Formal models and analysis of secure multicast in wired and wireless networks
  publication-title: Journal of Automated Reasoning
– volume: 117
  start-page: 221
  year: 1995
  end-page: 239
  ident: br000040
  article-title: A process algebra for timed systems
  publication-title: Information and Computation
– volume: vol. 4467
  start-page: 132
  year: 2007
  end-page: 150
  ident: br000120
  article-title: A calculus for mobile ad hoc networks
  publication-title: Coordination Models and Languages (COORDINATION)
– volume: 3
  start-page: 634
  year: 2004
  end-page: 660
  ident: br000010
  article-title: LiSP: a lightweight security protocol for wireless sensor networks
  publication-title: ACM Transactions on Embedded Computing Systems (TECS)
– volume: 367
  start-page: 203
  year: 2006
  end-page: 227
  ident: br000110
  article-title: A framework for security analysis of mobile wireless networks
  publication-title: Theoretical Computer Science
– volume: 412
  start-page: 3262
  year: 2011
  end-page: 3282
  ident: br000135
  article-title: Verification of mobile ad hoc networks: an algebraic approach
  publication-title: Theoretical Computer Science
– start-page: 479
  year: 2007
  end-page: 488
  ident: br000210
  article-title: MiniSec: a secure sensor network communication architecture
  publication-title: International Conference on Information Processing in Sensor Networks (IPSN)
– year: 2009
  ident: br000070
  article-title: Guide to Wireless Ad Hoc Networks, Computer Communications and Networks
– volume: 2
  start-page: 500
  year: 2006
  end-page: 528
  ident: br000015
  article-title: LEAP+: efficient security mechanisms for large-scale distributed sensor networks
  publication-title: ACM Transactions on Sensor Networks
– volume: vol. 3576
  start-page: 281
  year: 2005
  end-page: 285
  ident: br000180
  article-title: The AVISPA tool for the automated validation of internet security protocols and applications
  publication-title: International Conference on Computer Aided Verification (CAV)
– volume: 50
  start-page: 23
  year: 2004
  end-page: 49
  ident: br000060
  article-title: A simple framework for real-time cryptographic protocol analysis with compositional proof rules
  publication-title: Science of Computer Programming
– volume: 207
  start-page: 194
  year: 2009
  end-page: 208
  ident: br000115
  article-title: An observational theory for mobile ad hoc networks (full paper)
  publication-title: Information and Computation
– volume: vol. 6722
  start-page: 213
  year: 2011
  end-page: 227
  ident: br000160
  article-title: A process calculus for dynamic networks
  publication-title: Formal Techniques for Distributed Systems (FMOODS/FORTE)
– start-page: 1
  year: 2007
  end-page: 6
  ident: br000205
  article-title: Formal analysis of sensor network encryption protocol (SNEP)
  publication-title: IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS)
– volume: 22
  start-page: 644
  year: 1976
  end-page: 654
  ident: br000030
  article-title: New directions in cryptography
  publication-title: IEEE Transactions on Information Theory
– volume: 3
  start-page: 281
  year: 2005
  end-page: 323
  ident: br000045
  article-title: Clock synchronization for wireless sensor networks: a survey
  publication-title: Ad Hoc Networks
– start-page: 1985
  year: 2010
  end-page: 1992
  ident: br000215
  article-title: R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks
  publication-title: ACM Symposium on Applied Computing (SAC)
– start-page: 376
  year: 2008
  end-page: 381
  ident: br000220
  article-title: LEAP++: a robust key establishment scheme for wireless sensor networks
  publication-title: IEEE International Conference on Distributed Computing Systems Workshops (ICDCS)
– start-page: 379
  year: 2003
  end-page: 383
  ident: br000170
  article-title: Secure link state routing for mobile ad hoc networks
  publication-title: Symposium on Applications and the Internet Workshops (SAINT)
– volume: vol. 5170
  start-page: 12
  year: 2008
  end-page: 16
  ident: br000055
  article-title: A short presentation of Coq
  publication-title: International Conference on Theorem Proving in Higher Order Logics (TPHOLs 2007)
– volume: 411
  start-page: 1928
  year: 2010
  end-page: 1948
  ident: br000105
  article-title: An operational semantics for a calculus for wireless systems
  publication-title: Theoretical Computer Science
– volume: vol. 2283
  year: 2002
  ident: br000050
  publication-title: Isabelle/HOL—A Proof Assistant for Higher-Order Logic
– volume: vol. 1708
  start-page: 794
  year: 1999
  end-page: 813
  ident: br000080
  article-title: A uniform approach for the definition of security properties
  publication-title: World Congress on Formal Methods (FM)
– start-page: 156
  year: 2001
  end-page: 163
  ident: br000020
  article-title: Secure pebblenets
  publication-title: ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
– volume: vol. 6561
  start-page: 206
  year: 2010
  end-page: 222
  ident: br000095
  article-title: A calculus for the analysis of wireless network security protocols
  publication-title: Formal Aspects in Security and Trust (FAST)
– volume: 40
  start-page: 91
  year: 2009
  end-page: 99
  ident: br000185
  article-title: Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK
  publication-title: Telecommunication Systems
– volume: 21
  start-page: 120
  year: 1978
  end-page: 126
  ident: br000035
  article-title: A method for obtaining digital signatures and public-key cryptosystems
  publication-title: Communications of the ACM
– year: 1989
  ident: br000100
  article-title: Communication and Concurrency
– volume: vol. 323
  start-page: 86
  year: 2010
  end-page: 100
  ident: br000155
  article-title: Probabilistic mobility models for mobile and wireless networks
  publication-title: Theoretical Computer Science—6th IFIP TC 1/WG 2.2 International Conference (IFIP TCS)
– start-page: 308
  year: 2003
  end-page: 309
  ident: br000195
  article-title: LEAP—efficient security mechanisms for large-scale distributed sensor networks
  publication-title: International Conference on Enbedded Networked Sensor Systems (SenSys)
– volume: vol. 323
  start-page: 20
  year: 2010
  end-page: 31
  ident: br000150
  article-title: A calculus for power-aware multicast communications in ad hoc networks
  publication-title: Theoretical Computer Science—6th IFIP TC 1/WG 2.2 International Conference (IFIP TCS)
– year: 2009
  ident: 10.1016/j.scico.2013.01.005_br000070
  doi: 10.1007/978-1-84800-328-6
– year: 1989
  ident: 10.1016/j.scico.2013.01.005_br000100
– volume: 50
  start-page: 23
  issue: 1–3
  year: 2004
  ident: 10.1016/j.scico.2013.01.005_br000060
  article-title: A simple framework for real-time cryptographic protocol analysis with compositional proof rules
  publication-title: Science of Computer Programming
  doi: 10.1016/j.scico.2004.01.001
– volume: 105
  start-page: 375
  issue: 4
  year: 2010
  ident: 10.1016/j.scico.2013.01.005_br000130
  article-title: Equational reasoning on mobile ad hoc networks
  publication-title: Fundamenta Informaticae
  doi: 10.3233/FI-2010-371
– volume: 40
  start-page: 91
  issue: 3–4
  year: 2009
  ident: 10.1016/j.scico.2013.01.005_br000185
  article-title: Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK
  publication-title: Telecommunication Systems
  doi: 10.1007/s11235-008-9131-z
– start-page: 379
  year: 2003
  ident: 10.1016/j.scico.2013.01.005_br000170
  article-title: Secure link state routing for mobile ad hoc networks
– start-page: 1
  year: 2007
  ident: 10.1016/j.scico.2013.01.005_br000205
  article-title: Formal analysis of sensor network encryption protocol (SNEP)
– volume: 8
  start-page: 521
  issue: 5
  year: 2002
  ident: 10.1016/j.scico.2013.01.005_br000005
  article-title: SPINS: security protocols for sensor networks
  publication-title: Wireless Networks
  doi: 10.1023/A:1016598314198
– volume: vol. 323
  start-page: 20
  year: 2010
  ident: 10.1016/j.scico.2013.01.005_br000150
  article-title: A calculus for power-aware multicast communications in ad hoc networks
– volume: vol. 3576
  start-page: 281
  year: 2005
  ident: 10.1016/j.scico.2013.01.005_br000180
  article-title: The AVISPA tool for the automated validation of internet security protocols and applications
– volume: vol. 575
  start-page: 376
  year: 1991
  ident: 10.1016/j.scico.2013.01.005_br000075
  article-title: An overview and synthesis on timed process algebras
– start-page: 376
  year: 2008
  ident: 10.1016/j.scico.2013.01.005_br000220
  article-title: LEAP++: a robust key establishment scheme for wireless sensor networks
– start-page: 206
  year: 2004
  ident: 10.1016/j.scico.2013.01.005_br000025
  article-title: Key infection: smart trust for smart dust
– start-page: 153
  year: 1996
  ident: 10.1016/j.scico.2013.01.005_br000175
  article-title: Dynamic source routing in ad hoc wireless networks
– volume: 22
  start-page: 644
  issue: 6
  year: 1976
  ident: 10.1016/j.scico.2013.01.005_br000030
  article-title: New directions in cryptography
  publication-title: IEEE Transactions on Information Theory
  doi: 10.1109/TIT.1976.1055638
– volume: 3
  start-page: 281
  issue: 3
  year: 2005
  ident: 10.1016/j.scico.2013.01.005_br000045
  article-title: Clock synchronization for wireless sensor networks: a survey
  publication-title: Ad Hoc Networks
  doi: 10.1016/j.adhoc.2005.01.002
– volume: vol. 7226
  start-page: 403
  year: 2012
  ident: 10.1016/j.scico.2013.01.005_br000090
  article-title: A semantics analysis of wireless network security protocols
– volume: 412
  start-page: 3262
  issue: 28
  year: 2011
  ident: 10.1016/j.scico.2013.01.005_br000135
  article-title: Verification of mobile ad hoc networks: an algebraic approach
  publication-title: Theoretical Computer Science
  doi: 10.1016/j.tcs.2011.03.017
– volume: 21
  start-page: 120
  issue: 2
  year: 1978
  ident: 10.1016/j.scico.2013.01.005_br000035
  article-title: A method for obtaining digital signatures and public-key cryptosystems
  publication-title: Communications of the ACM
  doi: 10.1145/359340.359342
– volume: vol. 6561
  start-page: 206
  year: 2010
  ident: 10.1016/j.scico.2013.01.005_br000095
  article-title: A calculus for the analysis of wireless network security protocols
– volume: 117
  start-page: 221
  issue: 2
  year: 1995
  ident: 10.1016/j.scico.2013.01.005_br000040
  article-title: A process algebra for timed systems
  publication-title: Information and Computation
  doi: 10.1006/inco.1995.1041
– volume: vol. 6722
  start-page: 213
  year: 2011
  ident: 10.1016/j.scico.2013.01.005_br000160
  article-title: A process calculus for dynamic networks
– start-page: 479
  year: 2007
  ident: 10.1016/j.scico.2013.01.005_br000210
  article-title: MiniSec: a secure sensor network communication architecture
– volume: vol. 5961
  start-page: 228
  year: 2010
  ident: 10.1016/j.scico.2013.01.005_br000140
  article-title: A timed calculus for wireless systems
– volume: vol. 323
  start-page: 86
  year: 2010
  ident: 10.1016/j.scico.2013.01.005_br000155
  article-title: Probabilistic mobility models for mobile and wireless networks
– volume: 41
  start-page: 325
  issue: 3–4
  year: 2008
  ident: 10.1016/j.scico.2013.01.005_br000065
  article-title: Formal models and analysis of secure multicast in wired and wireless networks
  publication-title: Journal of Automated Reasoning
  doi: 10.1007/s10817-008-9112-7
– volume: 3
  start-page: 634
  issue: 3
  year: 2004
  ident: 10.1016/j.scico.2013.01.005_br000010
  article-title: LiSP: a lightweight security protocol for wireless sensor networks
  publication-title: ACM Transactions on Embedded Computing Systems (TECS)
  doi: 10.1145/1015047.1015056
– volume: vol. 5521
  start-page: 106
  year: 2009
  ident: 10.1016/j.scico.2013.01.005_br000145
  article-title: Mobility models and behavioural equivalence for wireless networks
– start-page: 162
  year: 2004
  ident: 10.1016/j.scico.2013.01.005_br000190
  article-title: TinySec: a link layer security architecture for wireless sensor networks
– start-page: 1985
  year: 2010
  ident: 10.1016/j.scico.2013.01.005_br000215
  article-title: R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks
– volume: vol. 2283
  year: 2002
  ident: 10.1016/j.scico.2013.01.005_br000050
– volume: 411
  start-page: 1928
  year: 2010
  ident: 10.1016/j.scico.2013.01.005_br000105
  article-title: An operational semantics for a calculus for wireless systems
  publication-title: Theoretical Computer Science
  doi: 10.1016/j.tcs.2010.01.023
– volume: 2
  start-page: 500
  issue: 4
  year: 2006
  ident: 10.1016/j.scico.2013.01.005_br000015
  article-title: LEAP+: efficient security mechanisms for large-scale distributed sensor networks
  publication-title: ACM Transactions on Sensor Networks
  doi: 10.1145/1218556.1218559
– volume: 207
  start-page: 194
  issue: 2
  year: 2009
  ident: 10.1016/j.scico.2013.01.005_br000115
  article-title: An observational theory for mobile ad hoc networks (full paper)
  publication-title: Information and Computation
  doi: 10.1016/j.ic.2007.11.010
– volume: vol. 4467
  start-page: 132
  year: 2007
  ident: 10.1016/j.scico.2013.01.005_br000120
  article-title: A calculus for mobile ad hoc networks
– start-page: 308
  year: 2003
  ident: 10.1016/j.scico.2013.01.005_br000195
  article-title: LEAP—efficient security mechanisms for large-scale distributed sensor networks
– volume: vol. 5170
  start-page: 12
  year: 2008
  ident: 10.1016/j.scico.2013.01.005_br000055
  article-title: A short presentation of Coq
– volume: 367
  start-page: 203
  issue: 1–2
  year: 2006
  ident: 10.1016/j.scico.2013.01.005_br000110
  article-title: A framework for security analysis of mobile wireless networks
  publication-title: Theoretical Computer Science
  doi: 10.1016/j.tcs.2006.08.036
– volume: vol. 1708
  start-page: 794
  year: 1999
  ident: 10.1016/j.scico.2013.01.005_br000080
  article-title: A uniform approach for the definition of security properties
– volume: vol. 5052
  start-page: 296
  year: 2008
  ident: 10.1016/j.scico.2013.01.005_br000125
  article-title: A process calculus for mobile ad hoc networks
– ident: 10.1016/j.scico.2013.01.005_br000085
  doi: 10.1145/381677.381696
– start-page: 59
  year: 2010
  ident: 10.1016/j.scico.2013.01.005_br000165
  article-title: Modeling and verifying ad hoc routing protocols
– start-page: 156
  year: 2001
  ident: 10.1016/j.scico.2013.01.005_br000020
  article-title: Secure pebblenets
– start-page: 59
  year: 2004
  ident: 10.1016/j.scico.2013.01.005_br000200
  article-title: TinyPK: securing sensor networks with public key technology
SSID ssj0006471
Score 2.1548295
Snippet Gorrieri and Martinelli’s timed Generalized Non-Deducibility on Compositions (tGNDC) schema is a well-known general framework for the formal verification of...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 53
SubjectTerms Key management protocol
Process calculus
Security analysis
Wireless sensor network
Title A semantic analysis of key management protocols for wireless sensor networks
URI https://dx.doi.org/10.1016/j.scico.2013.01.005
Volume 81
WOSCitedRecordID wos000331478600003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1872-7964
  dateEnd: 20180131
  omitProxy: false
  ssIdentifier: ssj0006471
  issn: 0167-6423
  databaseCode: AIEXJ
  dateStart: 19950201
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1JT8JAFJ4Y8ODF3Yhb5uANm8zQdqY9EoNRo8QDJtyaLtNEAi2haPj5vtkKEUPk4KWBlg7Q7-tbpm--h9AtB6ee0TRxUqCD48U0dYI0EA5gLSiPWZAkuWo2wfv9YDgM34ygQqXaCfCiCBaLcPqvUMM-AFsund0C7npQ2AGvAXTYAuyw_RPw3XYlJnC9lBDrUnEEblZTqqoe_0t9hhJIoOQY2lKweCxtXgVZLbwvdHF4tRq6Witg6tBlKwhb3TWx_k9PbYsMDEWpK-YnQL-yPiZmelnNK4TsQJLVKQfqySplvejSzkKCdYXExV01o7rzirGDWgDYeFTdo2fNVutpgxFk8cB5WWTnKgFV4i9dk30c_8Nj1XWEtkRtFKlBIjlIRGikVG2bHe6HYKub3afe8Ll2z0xn4fV_sFJUquhv7bf8Hq6shCCDQ7Rvcgfc1ZgfoR1RHKMD25cDG4BO0EsXWwpgSwFc5hgogJcUwDUFMFAAWwpgTQFsKXCK3h96g_tHx3TNcFIIR-YOZOxwx_kdTt1YeCQnJJGaPZSzjDIShwnJQy-kfsqFn9AOcylLZNIpXJ_llMTuGWoUZSHOEWZwRHCpYEQDL4-TUIo35jn3Y0FZlpEW6tiLE6VGUl52NhlHG4Bpobv6pKlWVNn8cWavemSCQh3sRcCjTSdebPc9l2hvSfUr1JjPPsU12k2_5h_V7MaQ6BtJJIWY
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+semantic+analysis+of+key+management+protocols+for+wireless+sensor+networks&rft.jtitle=Science+of+computer+programming&rft.au=Macedonio%2C+Damiano&rft.au=Merro%2C+Massimo&rft.date=2014-02-15&rft.issn=0167-6423&rft.volume=81&rft.spage=53&rft.epage=78&rft_id=info:doi/10.1016%2Fj.scico.2013.01.005&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_scico_2013_01_005
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-6423&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-6423&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-6423&client=summon