Formal Verification of the Coordinated Robust Authenticaion Protocol for Wireless Networks
نویسندگان
چکیده
Today we are moving towards a Post-PC era where people prefer to use hand held devices such as tablets or smart phones to maintain their presence in the E-communication world. Most of this communication is possible because of technologies such as Wireless Local Area Network (WLAN), WiMAX or LTE etc. Although the wireless hand held devices are capable of effectively connecting with their native network they often fail to maintain robust connectivity in unfamiliar networks. Therefore the need for collaborative and complementary usage has to be explored. With the range of approaches that are used to validate the mobile devices in heterogeneous wireless networks, the need for a user friendly, flexible and reliable method to interconnect and utilize the different classes of wireless networks is becoming inevitable. Wireless network users prefer to access different types of networks either independently or cooperatively. In either case, adequate security provision is critical to the successful operation of the networks. Moreover, emerging technologies should provide seamless migration between the varied networks. Hence the ability to use a single but unique set of credentials to authenticate the wireless devices in heterogeneous wireless networks would make the post-PC era more effective. In this paper we present details of the formal analysis carried out on our proposed coordinated robust authentication (CRA) protocol. Keywords-component; Wireless Networks, Authentication, Access Control, Heterogeneous Networks, Behavior tree, Formal Verification, Symbolic Analysis Laboratory, Linear Temporal Logict
منابع مشابه
An Adaptive Congestion Alleviating Protocol for Healthcare Applications in Wireless Body Sensor Networks: Learning Automata Approach
Wireless Body Sensor Networks (WBSNs) involve a convergence of biosensors, wireless communication and networks technologies. WBSN enables real-time healthcare services to users. Wireless sensors can be used to monitor patients’ physical conditions and transfer real time vital signs to the emergency center or individual doctors. Wireless networks are subject to more packet loss and congestion. T...
متن کاملHYREP: A Hybrid Low-Power Protocol for Wireless Sensor Networks
In this paper, a new hybrid routing protocol is presented for low power Wireless Sensor Networks (WSNs). The new system uses an integrated piezoelectric energy harvester to increase the network lifetime. Power dissipation is one of the most important factors affecting lifetime of a WSN. An innovative cluster head selection technique using Cuckoo optimization algorithm has been used in the desig...
متن کاملLEBRP - A Lightweight and Energy Balancing Routing Protocol for Energy-Constrained Wireless Ad Hoc Networks
A wireless ad hoc network typically refers to any set of wireless networks where all devices have equal status on a network and are free to associate with any other wireless ad hoc network devices in their range. As the nature of these networks, they commonly do not have external power supplies, and each node has a limited internal power source. In this paper, we put forward a new routing proto...
متن کاملA method to increasing the Quality of Service (QoS) in Wireless body area networks by providing a MAC layer Protocol based of Internet of Things
With the development of technology, the use of wireless telecommunication networks for the various affairs is essential. These networks are one of the safest and most widely used networks, for instance, in medical care and remote patient monitoring. What matters is the quality of service in these networks. The purpose of this paper is to increase packet transduction in a wireless body area netw...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013