4 research outputs found

    STWSN: A novel secure distributed transport protocol for wireless sensor networks

    Get PDF
    Several transport protocols for wireless sensor networks (WSNs) have been designed to fulfill efficiency requirements such as energy and reliability. Unfortunately, most of these transport protocols do not include sufficient security mechanisms and hence are vulnerable to numerous reliability and energy attacks. To address these vulnerabilities, this paper proposes a novel secure transport protocol, named as secure transport protocol for wireless sensor networks (STWSN). On the basis of distributed transport for sensor networks (DTSN) protocol, our protocol adds a new security extension in order to provide secure transport protocol. We provide both informal and formal security analyses of STWSN and show that it resists attacks on energy efficiency and reliability requirements. Last but not least, a performance analysis and simulation results are also presented

    On formal and automatic security verification of WSN transport protocols

    Get PDF
    In this paper, we address the problem of formal and automated security verification of WSN transport protocols that may perform cryptographic operations. The verification of this class of protocols is difficult because they typically consist of complex behavioral characteristics, such as real-time, probabilistic, and cryptographic operations. To solve this problem, we propose a probabilistic timed calculus for cryptographic protocols, and demonstrate how to use this formal language for proving security or vulnerability of protocols. The main advantage of the proposed language is that it supports an expressive syntax and semantics, including bisimilarities that supports real-time, probabilistic, and cryptographic issues at the same time. Hence, it can be used to verify the systems that involve these three property in a more convenient way. In addition, we propose an automatic verification method, based on the well-known PAT process analysis toolkit, for this class of protocols. For demonstration purposes, we apply the proposed manual and automatic proof methods for verifying the security of DTSN and SDTP, which are two of the recently proposed WSN tranport protocols

    On the Security of Information Dissemination in the Internet-of-Vehicles

    Get PDF
    Internet of Vehicles (IoV) is regarded as an emerging paradigm for connected vehicles to exchange their information with other vehicles using vehicle-to-vehicle (V2V) communications by forming a vehicular ad hoc networks (VANETs), with roadside units using vehicle-to-roadside (V2R) communications. IoV offers several benefits such as road safety, traffic efficiency, and infotainment by forwarding up-to-date traffic information about upcoming traffic. For instance, IoV is regarded as a technology that could help reduce the number of deaths caused by road accidents, and reduce fuel costs and travel time on the road. Vehicles could rapidly learn about the road condition and promptly respond and notify drivers for making informed decisions. However, malicious users in IoV may mislead the whole communications and create chaos on the road. Data falsification attack is one of the main security issues in IoV where vehicles rely on information received from other peers/vehicles. In this paper, we present data falsification attack detection using hashes for enhancing network security and performance by adapting contention window size to forward accurate information to the neighboring vehicles in a timely manner (to improve throughput while reducing end-to-end delay). We also present clustering approach to reduce travel time in case of traffic congestion. Performance of the proposed approach is evaluated using numerical results obtained from simulations. We found that the proposed adaptive approach prevents IoV from data falsification attacks and provides higher throughput with lower delay
    corecore