Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks

We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to...

Full description

Saved in:
Bibliographic Details
Published in:2009 22nd IEEE Computer Security Foundations Symposium pp. 109 - 123
Main Authors: Schaller, P., Schmidt, B., Basin, D., Capkun, S.
Format: Conference Proceeding
Language:English
Published: IEEE 01-07-2009
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium used and the distance traveled. All agents, including intruders, are subject to these constraints and this results in a distributed intruder with restricted, but more realistic, communication capabilities than those of the standard Dolev-Yao intruder. We have formalized our model in Isabelle/HOL and used it to verify protocols for authenticated ranging, distance bounding, and broadcast authentication based on delayed key disclosure.
AbstractList We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium used and the distance traveled. All agents, including intruders, are subject to these constraints and this results in a distributed intruder with restricted, but more realistic, communication capabilities than those of the standard Dolev-Yao intruder. We have formalized our model in Isabelle/HOL and used it to verify protocols for authenticated ranging, distance bounding, and broadcast authentication based on delayed key disclosure.
Author Schaller, P.
Basin, D.
Schmidt, B.
Capkun, S.
Author_xml – sequence: 1
  givenname: P.
  surname: Schaller
  fullname: Schaller, P.
  organization: ETH Zurich, Zurich, Switzerland
– sequence: 2
  givenname: B.
  surname: Schmidt
  fullname: Schmidt, B.
  organization: ETH Zurich, Zurich, Switzerland
– sequence: 3
  givenname: D.
  surname: Basin
  fullname: Basin, D.
  organization: ETH Zurich, Zurich, Switzerland
– sequence: 4
  givenname: S.
  surname: Capkun
  fullname: Capkun, S.
  organization: ETH Zurich, Zurich, Switzerland
BookMark eNotjEFPwyAYQInOxG3u4tULf6DzAwqUo1mcmkxdMp3eFlo-FK1lgRrTf28WPb28d3gTMupih4ScM5gzBuZysVnOOYCZqyMy5kLrQpbSHJMJaGWk0Iy_jsiYgRKFMgCnZJbzBwAwozQzYky299FhG7o3ajtHt5iCHw62fh9yaGxL1ynuMfUBM42ebrD5TqEfDrmPTWwz9THRl5CwxZzpA_Y_MX3mM3LibZtx9s8peV5ePy1ui9Xjzd3ialUEzlhfeGV5KZgwEr3jsqxKkKWXta65FI0TTlXeOl4zKFFXyJWom8pXde28QqsrMSUXf9-AiLt9Cl82DTvJBSjOxC-Yc1S1
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CSF.2009.6
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2377-5459
EndPage 123
ExternalDocumentID 5230621
Genre orig-research
GroupedDBID 29G
29N
29O
6IE
6IK
6IL
AAJGR
ALMA_UNASSIGNED_HOLDINGS
CBEJK
CHZPO
IPLJI
JC5
M43
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i211t-f6a2431395efd25484054f5b7b253cd3d68fad2b104e78e263bc8f8bbdf6ea783
IEDL.DBID RIE
ISBN 076953712X
9780769537122
ISSN 1063-6900
IngestDate Wed Jun 26 19:19:37 EDT 2024
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i211t-f6a2431395efd25484054f5b7b253cd3d68fad2b104e78e263bc8f8bbdf6ea783
OpenAccessLink http://www.inf.ethz.ch/personal/basin/pubs/csf09.pdf
PageCount 15
ParticipantIDs ieee_primary_5230621
PublicationCentury 2000
PublicationDate 2009-July
PublicationDateYYYYMMDD 2009-07-01
PublicationDate_xml – month: 07
  year: 2009
  text: 2009-July
PublicationDecade 2000
PublicationTitle 2009 22nd IEEE Computer Security Foundations Symposium
PublicationTitleAbbrev CSF
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001967193
ssj0019972
Score 1.9256601
Snippet We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a...
SourceID ieee
SourceType Publisher
StartPage 109
SubjectTerms Authentication
Broadcasting
Clocks
Communication standards
Communications technology
Computer security
Cryptography
Formal Security Model
Isabelle/HOL
Security Protocols
Synchronization
Wireless application protocol
Wireless Network Protocols
Wireless networks
Title Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
URI https://ieeexplore.ieee.org/document/5230621
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09b8IwELUKUyfaQtVveehYF2LHXzMFMSEkWtQN2fFZqlQlqIH_jx0HUKUu3RIPkWU7vnt3790h9KzciBpFGWF57khOM0FMYRkBDlznptCsCebMlnL-qd4msUzOy1ELAwAN-Qxe42OTy3dVsYuhsmGMYIqoGu9IrZJW6xRP0UJmJ01k5E-kTKdgJCDAUYLsmjOZ0UPlncM7beuWZiM9HC-nqYql-NVvpTE3097_JnqBBifdHl4cLdIlOoPyCvUOjRtw-x_30Sp2QIs6dGxKh1fhEDZqJ7xoNy1-ZBMJ11DjyuNl2-MuDm-rcHJqHFxdHImz3-GixPNEJa8H6GM6eR_PSNtggXwF3LclXhgaHAimOXgXkGIAezz33EpLOSscc0J546gNkA2kAiqYLZRX1jovwEjFrlG3rEq4QRg010IVwdp5mYM22gEvgrPhGdMQnIhb1I_LtN6kGhrrdoXu_h6-R-cpaxNpsQ-ou_3ZwSPq1G731Oz6Hj9-pyY
link.rule.ids 310,311,782,786,791,792,798,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NT8JAEN0oHvSECsZv9-DRFbrb_TojBCMSEpB4I9vubGJiWkLh_7vbFoiJF2_tHppmO9uZN_PeDEKPynapUZQRFseWxDQSxKQJI8CB69ikmpXJnOFUjj_VSz-0yXnaaWEAoCSfwXO4LGv5Nk83IVXWCRlMEVTjRzyWQlZqrX1GRQsZ7VWRgUFR1ToFIx4DdivQrjmTEd323tne07pzadTVnd50UPWxFL8mrpQOZ9D836ueovZeuYcnO590hg4gO0fN7egGXJ_kFpqHGWhBiY5NZvHcm2Gpd8KT-rOFhywD5RoKnDs8rafcheV17m2nwD7YxYE6--1_lXhckcmLNvoY9Ge9IalHLJAvj_zWxAlDfQjBNAdnPVb0cI_HjicyoZylllmhnLE08aANpAIqWJIqp5LEOgFGKnaBGlmewSXCoLkWKvX-zskYtNEWeOrDDceYBh9GXKFW2KbFsuqisah36Prv5Qd0PJy9jxaj1_HbDTqpajiBJHuLGuvVBu7QYWE396UF_ABAV6p3
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+22nd+IEEE+Computer+Security+Foundations+Symposium&rft.atitle=Modeling+and+Verifying+Physical+Properties+of+Security+Protocols+for+Wireless+Networks&rft.au=Schaller%2C+P.&rft.au=Schmidt%2C+B.&rft.au=Basin%2C+D.&rft.au=Capkun%2C+S.&rft.date=2009-07-01&rft.pub=IEEE&rft.isbn=9780769537122&rft.issn=1063-6900&rft.eissn=2377-5459&rft.spage=109&rft.epage=123&rft_id=info:doi/10.1109%2FCSF.2009.6&rft.externalDocID=5230621
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6900&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6900&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6900&client=summon