Analysing ZigBee Key Establishment Protocols
نویسنده
چکیده
Preface This report provides a detailed documentation on the application of static program analysis to the key establishment protocols of the ZigBee wireless sensor network standard. The approach presented in this report is within the scope of the SENSORIA (Software Engineering for Service-Oriented Overlay Computers) project, and will form a preliminary version of one of the chapters in my PhD dissertation. The discovered flaw and the proposed secure protocols were recently published in a conference paper (see references [17]) and also accepted for journal publication. I would like to thank Hanne Riis Nielson and Flemming Nielson for the supervision and invaluable contribution in this work, and also for providing me with this opportunity to work on an international research project. I would also like to thank Gavin Lowe for kind discussions and feedback on fixing the flaw in the key establishment protocol.
منابع مشابه
A Coloured Petri Net Methodology and Library for Security Analysis of Network Protocols
Formal methods are often used to prove properties of network protocols, including required security properties. However for a protocol modeller the techniques available for security analysis often require expert knowledge of the technique. Also the tight coupling of protocol model and security attacks limit re-use of models. With Coloured Petri nets as the selected formal method, this paper pro...
متن کاملVerifying Security Properties in Unbounded Multiagent Systems
We study the problem of analysing the security for an unbounded number of concurrent sessions of a cryptographic protocol. Our formal model accounts for an arbitrary number of agents involved in a protocol-exchange which is subverted by a Dolev-Yao attacker. We define the parameterised model checking problem with respect to security requirements expressed in temporal-epistemic logics. We formul...
متن کاملResearch and Design of Meter Reading System Based on ZigBee Wireless Sensor Network
With the rapid development of wireless technologies, it is possible for Chinese automatic meter reading system (AMRS) to be equipped with wireless sensor networks due to their low-cost, simplicity and mobility. In the current study, we compared the advantages of ZigBee with other two similar wireless networking protocols, Wi-Fi and Bluetooth, and proposed a wireless solution for AMRS based on Z...
متن کاملData Security in Wireless Sensor Networks – the Task for Public Key Cryptography
The paper describes security algorithms and protocols provided by recent WSN stacks where symmetric-key schemes are commonly used. Using these schemes seems to be impractical in large scale networks; hence the paper intends their replacement by public-key schemes for mentioned low cost and low power MCU platforms. Moreover, the paper proposes implementation of Wireless Sensor Network (WSN) stac...
متن کاملNon-associative key establishment protocols and their implementation
We provide implementation details for non-associative key establishment protocols. In particular, we describe the implementation of non-associative key establishment protocols for all left self-distributive and all mutually left distributive systems.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1205.6678 شماره
صفحات -
تاریخ انتشار 2012