skip to main content
10.1109/CSF.2009.6guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks

Published: 08 July 2009 Publication History

Abstract

We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time. In particular, communication is subject to physical constraints, for example, message transmission takes time determined by the communication medium used and the distance traveled. All agents, including intruders, are subject to these constraints and this results in a distributed intruder with restricted, but more realistic, communication capabilities than those of the standard Dolev-Yao intruder. We have formalized our model in Isabelle/HOL and used it to verify protocols for authenticated ranging, distance bounding, and broadcast authentication based on delayed key disclosure.

Cited By

View all
  1. Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    CSF '09: Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium
    July 2009
    314 pages
    ISBN:9780769537122

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 08 July 2009

    Author Tags

    1. Formal Security Model
    2. Isabelle/HOL
    3. Security Protocols
    4. Wireless Network Protocols

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media