Next Article in Journal
An Investigation of Turkish Pre-Service Teachers’ Technological, Pedagogical and Content Knowledge
Previous Article in Journal
A Cloud Based Mobile Dispatching System with Built-in Social CRM Component: Design and Implementation
Article Menu

Export Article

Open AccessArticle
Computers 2015, 4(3), 215-233; doi:10.3390/computers4030215

Security Property Validation of the Sensor Network Encryption Protocol (SNEP)

Department of Computer Science and Engineering, United International University, Dhaka 1209, Bangladesh
Academic Editor: Pedro Alonso Jordá
Received: 30 May 2015 / Revised: 7 July 2015 / Accepted: 17 July 2015 / Published: 24 July 2015
View Full-Text   |   Download PDF [283 KB, uploaded 24 July 2015]   |  

Abstract

Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protocols for Sensor Networks (SPINS) is exceptional, as it has been designed with security as a goal. SPINS is composed of two building blocks: Secure Network Encryption Protocol (SNEP) and the “micro” version of the Timed Efficient Streaming Loss-tolerant Authentication (TESLA), named μTESLA. From the inception of SPINS, a number of efforts have been made to validate its security properties. In this paper, we have validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA. Using the protocol specification language, HLPSL, we model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission. Next, we validate the security properties of these combined protocols, using different AVISPA back-ends. AVISPA reports the models we have developed free from attacks. However, by analyzing the key distribution sub-protocol, we find one threat of a potential DoS attack that we have demonstrated by modeling in AVISPA. Finally, we propose a modification, and AVISPA reports this modified version free from the potential DoS attack. View Full-Text
Keywords: wireless sensor networks (WSN); Secure Network Encryption Protocol (SNEP); key distribution, strong freshness, validating security protocols; AVISPA; DoS attack wireless sensor networks (WSN); Secure Network Encryption Protocol (SNEP); key distribution, strong freshness, validating security protocols; AVISPA; DoS attack
Figures

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Islam, S. Security Property Validation of the Sensor Network Encryption Protocol (SNEP). Computers 2015, 4, 215-233.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Computers EISSN 2073-431X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top