2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems 2007
DOI: 10.1109/mobhoc.2007.4428763
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis of Sensor Network Encryption Protocol (SNEP)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0
1

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 19 publications
0
10
0
1
Order By: Relevance
“…However, this claim is not justified, since a node sends data to the base station in encrypted format (note that the node to base station data transmission protocol is explained in Section 2.2), and the intruder is not able to divulge the encryption key. The models we are presenting in this paper are different from the models explained in [17] in many ways that are explained here:…”
Section: Related Workmentioning
confidence: 92%
See 1 more Smart Citation
“…However, this claim is not justified, since a node sends data to the base station in encrypted format (note that the node to base station data transmission protocol is explained in Section 2.2), and the intruder is not able to divulge the encryption key. The models we are presenting in this paper are different from the models explained in [17] in many ways that are explained here:…”
Section: Related Workmentioning
confidence: 92%
“…In [17], an AVISPA model has been developed to verify two security properties: authenticity and confidentiality of SNEP message components. Two separate models have been developed to verify the scenarios: requesting information from the base station to a normal node and key distribution between two nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Where K AB denotes the shared key between two nodes A and B. Besides, because the PFC‐CTR is also based on counter mode, accordingly, the system employ PFC‐CTR is also resilient to replay attacks, like SNEP and ZigBee .…”
Section: Applicationsmentioning
confidence: 99%
“…The AVISPA model checker [2] has been used in [40] for an analysis of TinySec [19], LEAP [42], and TinyPK [41], three wireless sensor network security protocols, and in [39] for an analysis of the Sensor Network Encryption Protocol SNEP [32]. In particular, in [40] the authors considered the communication between immediate neighbour nodes which use the pairwise shared key already established by LEAP.…”
Section: Conclusion Related and Future Workmentioning
confidence: 99%