Computer Science ›› 2009, Vol. 36 ›› Issue (10): 132-136.

Previous Articles     Next Articles

Using SPIN to Model and Analyze Security Protocol in Wireless Sensor Network

JING Chao, CHANG Liang, GU Tian-long   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Model checking has been successfully applied to design and analyze wired network security protocol. Comparcel with the wired network,wircless sensor network(WSN) also has the strict requirement on its security protocol.The vulnerabilities of WSN exist in communication environment and network node; those are great challenges for designing and analyzing a security protocol in WSN. This paper proposed an appropriate method to model and analyze security protocol in the WSN. Based on the method of wired network security protocol, with the thorough consideration of sensor network environmental factors and feature of sensor nodes,a general model was established and analyzed by our method. "hhe paper took WSN SPINS security protocol as an example to model and analyze via SPIN tool. "hhrough verifying the authentication and confidentiality of SPINS, we found flaws in the SPINS protocol. I}he work demonstrates the feasibility of using model checking to model and analyze security protocol in WSN, and expands the usage of model checking.

Key words: Wireless sensor network, Model checking, SPINS protocol, SPIN, Promcla

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!