Analysis and improvement of sensor networks security protocol
A suit of security protocols for sensor networks was presented by A.Perrig.The security of the protocols was analyzed,and then one attack had been found in the two-party key agreement protocol that a false request message from an intruder.In that case,the intruder impersonates the node and creates f...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2011-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74418936/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537786045267968 |
---|---|
author | YAN Li-li1 PENG Dai-yuan1 GAO Yue-xiang1 |
author_facet | YAN Li-li1 PENG Dai-yuan1 GAO Yue-xiang1 |
author_sort | YAN Li-li1 |
collection | DOAJ |
description | A suit of security protocols for sensor networks was presented by A.Perrig.The security of the protocols was analyzed,and then one attack had been found in the two-party key agreement protocol that a false request message from an intruder.In that case,the intruder impersonates the node and creates false requests.An improved protocol to this attack was proposed.The security of improved protocol was analyzed by the extended strand spaces,where two main security properties,authenticity and confidentiality,were checked.And the analysis proves the correctness of the protocol.The extended strand spaces also gives a practical base for further application of strand spaces in analyzing complicated protocols. |
format | Article |
id | doaj-art-55263b2d64fc4909a3c528a96fab5afb |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2011-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-55263b2d64fc4909a3c528a96fab5afb2025-01-14T08:23:44ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2011-01-013213914574418936Analysis and improvement of sensor networks security protocolYAN Li-li1PENG Dai-yuan1GAO Yue-xiang1A suit of security protocols for sensor networks was presented by A.Perrig.The security of the protocols was analyzed,and then one attack had been found in the two-party key agreement protocol that a false request message from an intruder.In that case,the intruder impersonates the node and creates false requests.An improved protocol to this attack was proposed.The security of improved protocol was analyzed by the extended strand spaces,where two main security properties,authenticity and confidentiality,were checked.And the analysis proves the correctness of the protocol.The extended strand spaces also gives a practical base for further application of strand spaces in analyzing complicated protocols.http://www.joconline.com.cn/zh/article/74418936/wireless sensor networkssecurity protocolsformal analysisstrand spaces |
spellingShingle | YAN Li-li1 PENG Dai-yuan1 GAO Yue-xiang1 Analysis and improvement of sensor networks security protocol Tongxin xuebao wireless sensor networks security protocols formal analysis strand spaces |
title | Analysis and improvement of sensor networks security protocol |
title_full | Analysis and improvement of sensor networks security protocol |
title_fullStr | Analysis and improvement of sensor networks security protocol |
title_full_unstemmed | Analysis and improvement of sensor networks security protocol |
title_short | Analysis and improvement of sensor networks security protocol |
title_sort | analysis and improvement of sensor networks security protocol |
topic | wireless sensor networks security protocols formal analysis strand spaces |
url | http://www.joconline.com.cn/zh/article/74418936/ |
work_keys_str_mv | AT yanlili1 analysisandimprovementofsensornetworkssecurityprotocol AT pengdaiyuan1 analysisandimprovementofsensornetworkssecurityprotocol AT gaoyuexiang1 analysisandimprovementofsensornetworkssecurityprotocol |