Formal Verification Method for Design and Implementation of Security Protocols in Wireless Sensor Networks

A wireless sensor network and security protocol technology, applied in the field of formal verification and software formal verification, which can solve the problems of poor scalability, poor security, and low development efficiency.

Active Publication Date: 2018-04-20
ZHEJIANG UNIV OF TECH
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the disadvantages of poor security, low development efficiency, and poor scalability in the design and implementation of existing wireless sensor network security protocols, the present invention provides a method that effectively guarantees the security, efficiency, and scalability of design and development. A good formal verification method for the design and implementation of wireless sensor network security protocols

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Formal Verification Method for Design and Implementation of Security Protocols in Wireless Sensor Networks
  • Formal Verification Method for Design and Implementation of Security Protocols in Wireless Sensor Networks
  • Formal Verification Method for Design and Implementation of Security Protocols in Wireless Sensor Networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described below in conjunction with the accompanying drawings.

[0028] refer to Figure 1 ~ Figure 4 , a formal verification method for the design and implementation of wireless sensor network security protocols, including the following steps:

[0029] (1) Design method of sensor network security protocol based on logic analysis. The designer of the sensor network security protocol accepts a protocol design goal, and designs a prototype of the protocol based on the analysis of the environmental factors of the sensor network; establishes a logical reasoning system, completes the protocol modeling and logic analysis, and modifies the protocol design plan according to the analysis results. Repeat the logic analysis until the protocol logic is correct; finally give an informal description of the protocol specification.

[0030] (2) A security protocol specification description language for sensor network development environment. The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A formal verification method for the design and implementation of wireless sensor network security protocols, including the following steps: (1) Design method of sensor network security protocols based on logic analysis: the sensor network security protocol designer accepts a protocol design goal, in On the basis of analyzing the environmental factors of the sensor network, design a prototype of the protocol; establish a logical reasoning system, complete the protocol modeling and logical analysis, modify the protocol design plan according to the analysis results, repeat the logical analysis until the protocol logic is correct; finally give the protocol specification (2) A security protocol specification description language for the sensor network development environment; (3) An automatic verification method for security protocol codes based on model checking. The invention effectively guarantees the safety and efficiency of design and development, and has good expandability.

Description

technical field [0001] The invention relates to the technical field of software formal verification, in particular to a formal verification method. Background technique [0002] Due to the limited resources of sensor nodes and the special deployment environment, the development, testing and updating of sensor network protocol systems are more difficult than traditional networks, so the formal modeling and analysis of sensor network systems is particularly important. Traditional state detection methods have been studied for the formal description and verification of sensor network systems to improve the reliability analysis of system design; for the security of routing algorithms, Nair et al. proposed a behavior-based temporal logic pair Formal modeling and analysis of the routing information tree in the sensor network environment. Vajda et al. established an attack tolerance model for link state routing protocols, and gave a security proof model for routing protocols. Tobarr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 陈铁明江颉陈波王小号
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products