Wireless sensor network security protocol verification method based on model checking

A network security protocol and wireless sensor technology, applied in the field of security protocol verification, can solve the problems that the end-to-end encryption mechanism cannot be used in wireless sensor networks, digital signatures cannot be performed, sensor nodes have weak processing capabilities, storage capabilities, and communication capabilities.

Active Publication Date: 2013-12-25
NANJING UNIV
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the processing capability, storage capability and communication capability of the sensor node itself are relatively weak, so that the traditional end-to-end encryption mechanism cannot be used in the wireless sensor network, and the public key encryption in the traditional network is no longer applicable, and digital signature cannot be performed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless sensor network security protocol verification method based on model checking
  • Wireless sensor network security protocol verification method based on model checking
  • Wireless sensor network security protocol verification method based on model checking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Certain embodiments of the accompanying drawings of the present invention are described in more detail below.

[0055] according to figure 1 , the present invention is built on the basis of model checking technology, and the specific implementation mode is:

[0056] 1. Establish a state transition system based on time automata

[0057] The state transition system based on timed automata described in the present invention uses timed automata modeling to describe the possible states of the protocol during operation for the sender, receiver and intruder involved in the protocol respectively.

[0058] For the sender, a timed automaton is used to describe the state process of executing the protocol. When the sender communicates securely with the receiver, the protocol starts to execute. First, the sender enters the idle state from the dormant state, sets up a status flag, denoted as A, and sets up a clock variable Ta at the same time. A and Ta change continuously with the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a wireless sensor network security protocol verification method based on model checking. A state migratory system formed by a timed automata represents a wireless sensor network security protocol, a modal / time sequence logical formula represents the conditions which need to be met by the security protocol in the wireless sensor network, and the verification of the wireless sensor network security protocol is converted into a model carrying out verification that whether the state migratory system is a formula. According to the wireless sensor network security protocol verification method based on model checking, the characteristics of the wireless sensor network are sufficiently considered during the security protocol verification process, a clock restraint condition is added in the modal / time sequence logical formula, and comprehensive verification can be conducted on the wireless sensor network security protocol.

Description

technical field [0001] The invention relates to a safety protocol verification method, which mainly uses model checking technology to solve the safety verification problem of the wireless sensor network protocol, and belongs to the cross-technical application of computer technology, wireless communication, wireless sensor network, real-time technology, distributed system and verification technology field. Background technique [0002] Wireless sensor network is a brand-new information acquisition and processing technology, which can collaboratively monitor, perceive and collect information of various environments or monitoring objects in the network distribution area in real time, and process the information to obtain detailed and accurate information. Send to users who need this information. The sensor network can enable people to obtain a large amount of detailed and reliable information at any time, place and under any environmental conditions, and has a very broad appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W80/08H04W84/18H04W12/121
Inventor 陈志彭超宇李宣东岳文静王林章曾雅芸
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products