Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to...
Saved in:
Published in: | 2009 22nd IEEE Computer Security Foundations Symposium pp. 109 - 123 |
---|---|
Main Authors: | , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-07-2009
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium used and the distance traveled. All agents, including intruders, are subject to these constraints and this results in a distributed intruder with restricted, but more realistic, communication capabilities than those of the standard Dolev-Yao intruder. We have formalized our model in Isabelle/HOL and used it to verify protocols for authenticated ranging, distance bounding, and broadcast authentication based on delayed key disclosure. |
---|---|
AbstractList | We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium used and the distance traveled. All agents, including intruders, are subject to these constraints and this results in a distributed intruder with restricted, but more realistic, communication capabilities than those of the standard Dolev-Yao intruder. We have formalized our model in Isabelle/HOL and used it to verify protocols for authenticated ranging, distance bounding, and broadcast authentication based on delayed key disclosure. |
Author | Schaller, P. Basin, D. Schmidt, B. Capkun, S. |
Author_xml | – sequence: 1 givenname: P. surname: Schaller fullname: Schaller, P. organization: ETH Zurich, Zurich, Switzerland – sequence: 2 givenname: B. surname: Schmidt fullname: Schmidt, B. organization: ETH Zurich, Zurich, Switzerland – sequence: 3 givenname: D. surname: Basin fullname: Basin, D. organization: ETH Zurich, Zurich, Switzerland – sequence: 4 givenname: S. surname: Capkun fullname: Capkun, S. organization: ETH Zurich, Zurich, Switzerland |
BookMark | eNotjEFPwyAYQInOxG3u4tULf6DzAwqUo1mcmkxdMp3eFlo-FK1lgRrTf28WPb28d3gTMupih4ScM5gzBuZysVnOOYCZqyMy5kLrQpbSHJMJaGWk0Iy_jsiYgRKFMgCnZJbzBwAwozQzYky299FhG7o3ajtHt5iCHw62fh9yaGxL1ynuMfUBM42ebrD5TqEfDrmPTWwz9THRl5CwxZzpA_Y_MX3mM3LibZtx9s8peV5ePy1ui9Xjzd3ialUEzlhfeGV5KZgwEr3jsqxKkKWXta65FI0TTlXeOl4zKFFXyJWom8pXde28QqsrMSUXf9-AiLt9Cl82DTvJBSjOxC-Yc1S1 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/CSF.2009.6 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2377-5459 |
EndPage | 123 |
ExternalDocumentID | 5230621 |
Genre | orig-research |
GroupedDBID | 29G 29N 29O 6IE 6IK 6IL AAJGR ALMA_UNASSIGNED_HOLDINGS CBEJK CHZPO IPLJI JC5 M43 OCL RIE RIL RNS |
ID | FETCH-LOGICAL-i211t-f6a2431395efd25484054f5b7b253cd3d68fad2b104e78e263bc8f8bbdf6ea783 |
IEDL.DBID | RIE |
ISBN | 076953712X 9780769537122 |
ISSN | 1063-6900 |
IngestDate | Wed Jun 26 19:19:37 EDT 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i211t-f6a2431395efd25484054f5b7b253cd3d68fad2b104e78e263bc8f8bbdf6ea783 |
OpenAccessLink | http://www.inf.ethz.ch/personal/basin/pubs/csf09.pdf |
PageCount | 15 |
ParticipantIDs | ieee_primary_5230621 |
PublicationCentury | 2000 |
PublicationDate | 2009-July |
PublicationDateYYYYMMDD | 2009-07-01 |
PublicationDate_xml | – month: 07 year: 2009 text: 2009-July |
PublicationDecade | 2000 |
PublicationTitle | 2009 22nd IEEE Computer Security Foundations Symposium |
PublicationTitleAbbrev | CSF |
PublicationYear | 2009 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001967193 ssj0019972 |
Score | 1.9256601 |
Snippet | We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 109 |
SubjectTerms | Authentication Broadcasting Clocks Communication standards Communications technology Computer security Cryptography Formal Security Model Isabelle/HOL Security Protocols Synchronization Wireless application protocol Wireless Network Protocols Wireless networks |
Title | Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks |
URI | https://ieeexplore.ieee.org/document/5230621 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09b8IwELUKUyfaQtVveehYF2LHXzMFMSEkWtQN2fFZqlQlqIH_jx0HUKUu3RIPkWU7vnt3790h9KzciBpFGWF57khOM0FMYRkBDlznptCsCebMlnL-qd4msUzOy1ELAwAN-Qxe42OTy3dVsYuhsmGMYIqoGu9IrZJW6xRP0UJmJ01k5E-kTKdgJCDAUYLsmjOZ0UPlncM7beuWZiM9HC-nqYql-NVvpTE3097_JnqBBifdHl4cLdIlOoPyCvUOjRtw-x_30Sp2QIs6dGxKh1fhEDZqJ7xoNy1-ZBMJ11DjyuNl2-MuDm-rcHJqHFxdHImz3-GixPNEJa8H6GM6eR_PSNtggXwF3LclXhgaHAimOXgXkGIAezz33EpLOSscc0J546gNkA2kAiqYLZRX1jovwEjFrlG3rEq4QRg010IVwdp5mYM22gEvgrPhGdMQnIhb1I_LtN6kGhrrdoXu_h6-R-cpaxNpsQ-ou_3ZwSPq1G731Oz6Hj9-pyY |
link.rule.ids | 310,311,782,786,791,792,798,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8JAEN0oHvSECsZv9-DRFbrb_TojBCMSEpB4I9vubGJiWkLh_7vbFoiJF2_tHppmO9uZN_PeDEKPynapUZQRFseWxDQSxKQJI8CB69ikmpXJnOFUjj_VSz-0yXnaaWEAoCSfwXO4LGv5Nk83IVXWCRlMEVTjRzyWQlZqrX1GRQsZ7VWRgUFR1ToFIx4DdivQrjmTEd323tne07pzadTVnd50UPWxFL8mrpQOZ9D836ueovZeuYcnO590hg4gO0fN7egGXJ_kFpqHGWhBiY5NZvHcm2Gpd8KT-rOFhywD5RoKnDs8rafcheV17m2nwD7YxYE6--1_lXhckcmLNvoY9Ge9IalHLJAvj_zWxAlDfQjBNAdnPVb0cI_HjicyoZylllmhnLE08aANpAIqWJIqp5LEOgFGKnaBGlmewSXCoLkWKvX-zskYtNEWeOrDDceYBh9GXKFW2KbFsuqisah36Prv5Qd0PJy9jxaj1_HbDTqpajiBJHuLGuvVBu7QYWE396UF_ABAV6p3 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+22nd+IEEE+Computer+Security+Foundations+Symposium&rft.atitle=Modeling+and+Verifying+Physical+Properties+of+Security+Protocols+for+Wireless+Networks&rft.au=Schaller%2C+P.&rft.au=Schmidt%2C+B.&rft.au=Basin%2C+D.&rft.au=Capkun%2C+S.&rft.date=2009-07-01&rft.pub=IEEE&rft.isbn=9780769537122&rft.issn=1063-6900&rft.eissn=2377-5459&rft.spage=109&rft.epage=123&rft_id=info:doi/10.1109%2FCSF.2009.6&rft.externalDocID=5230621 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6900&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6900&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6900&client=summon |