From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appeara...

Full description

Saved in:
Bibliographic Details
Published inJournal of sensors Vol. 2016; no. 2016; pp. 1 - 11
Main Authors Chen, Bo, Li, Shijian, Yu, Zhenbo, Chen, Tieming
Format Journal Article
LanguageEnglish
Published Cairo, Egypt Hindawi Publishing Corporation 01.01.2016
Hindawi Limited
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN) and wireless body area networks (WBAN), formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN.
AbstractList Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN) and wireless body area networks (WBAN), formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN.
Author Chen, Tieming
Yu, Zhenbo
Li, Shijian
Chen, Bo
Author_xml – sequence: 1
  fullname: Chen, Bo
– sequence: 2
  fullname: Li, Shijian
– sequence: 3
  fullname: Yu, Zhenbo
– sequence: 4
  fullname: Chen, Tieming
BookMark eNqF0U1LAzEQBuAgFWyrN88S8CJobbLZJLvearEq1A9o_bgt6WZWU7dJTbaU_nu3tFTwIgzMwDwMA28LNayzgNAxJZeUct6NCBXdRKaSi2QPNalIZEdGImnsZv5-gFohTAkRTDLWRNXAuxl-Mx5KCAGPwAbn8SNUS-e_Aq7c7-7a6RXueVC79RUeOD9TJX5wGkpjP7CyGr-CN4XJVWWcxXWNIF94U63wS1iT5974EO0XqgxwtO1tNB7cjPt3neHT7X2_N-wozljVEXEuJcmjgqacMlYUSjAGBedRQhTkQicyj7WIeM2lnsiJBkpUFOt4kqaJYm10tjk79-57AaHKZibkUJbKgluEjMqURalgManp6R86dQtv6-dqxQkTgiZrdbFRuXcheCiyuTcz5VcZJdk6gWydQLZNoObnG_5prFZL858-2WioDRTqV1NKhBDsB-9WkR4
CitedBy_id crossref_primary_10_1007_s10586_017_0847_y
Cites_doi 10.1016/j.comnet.2008.05.009
10.1109/TIT.1983.1056650
10.1109/JSAC.2005.861382
10.3969/j.issn.1004-1699.2012.04.026
10.2478/v10127-010-0032-7
10.1007/978-3-540-88479-8-22
ContentType Journal Article
Copyright Copyright © 2016 Tieming Chen et al.
Copyright © 2016 Tieming Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Copyright_xml – notice: Copyright © 2016 Tieming Chen et al.
– notice: Copyright © 2016 Tieming Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
DBID ADJCN
AHFXO
RHU
RHW
RHX
AAYXX
CITATION
3V.
7SP
7U5
7XB
8AL
8FD
8FE
8FG
8FK
ABJCF
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
CWDGH
D1I
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
KB.
L6V
L7M
M0N
M7S
P5Z
P62
PDBOC
PIMPY
PQEST
PQQKQ
PQUKI
PRINS
PTHSS
Q9U
DOI 10.1155/2016/8797568
DatabaseName الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals
معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete
Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Open Access Journals (Hindawi Publishing)
CrossRef
ProQuest Central (Corporate)
Electronics & Communications Abstracts
Solid State and Superconductivity Abstracts
ProQuest Central (purchase pre-March 2016)
Computing Database (Alumni Edition)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
Middle East & Africa Database
ProQuest Materials Science Collection
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Materials Science Database
ProQuest Engineering Collection
Advanced Technologies Database with Aerospace
Computing Database
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Materials Science Collection
Publicly Available Content Database
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
ProQuest Central Basic
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Materials Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest Engineering Collection
Middle East & Africa Database
ProQuest Central Korea
Materials Science Database
Advanced Technologies Database with Aerospace
Engineering Collection
ProQuest Materials Science Collection
Advanced Technologies & Aerospace Collection
ProQuest Computing
Engineering Database
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Solid State and Superconductivity Abstracts
ProQuest One Academic
ProQuest Central (Alumni)
DatabaseTitleList Solid State and Superconductivity Abstracts


Publicly Available Content Database
CrossRef
Database_xml – sequence: 1
  dbid: RHX
  name: Open Access Journals (Hindawi Publishing)
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1687-7268
Editor Cao, Jian-Nong
Editor_xml – sequence: 1
  givenname: Jian-Nong
  surname: Cao
  fullname: Cao, Jian-Nong
EndPage 11
ExternalDocumentID 3900591281
10_1155_2016_8797568
1110666
GroupedDBID .4S
.DC
188
24P
29L
2UF
2WC
3V.
4.4
5GY
5VS
8FE
8FG
8R4
8R5
AAFWJ
AAJEY
AAKPC
ABJCF
ABUWG
ACGFO
ACIWK
ADBBV
ADJCN
AEGXH
AENEX
AFKRA
AHFXO
AINHJ
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
AZQEC
BCNDV
BENPR
BGLVJ
BPHCQ
C1A
CAHYU
CCPQU
CNMHZ
CS3
CWDGH
D1I
DWQXO
E3Z
EBS
EDO
EJD
GNUQQ
GROUPED_DOAJ
H13
HCIFZ
IAO
IEA
IGS
IL9
IPNFZ
ITC
K6V
K7-
KB.
KQ8
L6V
M0N
M7S
M~E
OK1
P62
PDBOC
PIMPY
PQQKQ
PROAC
PTHSS
Q2X
RHU
RHX
RIG
RNS
TR2
TUS
UGNYK
UNMZH
RHW
AAYXX
CITATION
7SP
7U5
7XB
8AL
8FD
8FK
JQ2
L7M
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-a533t-64c770c2f195133ffa633ef55280aec6d87c4d625a537db7bde10a24d4b998a3
IEDL.DBID RHX
ISSN 1687-725X
IngestDate Fri Aug 16 05:05:46 EDT 2024
Thu Oct 10 22:21:28 EDT 2024
Fri Aug 23 02:36:49 EDT 2024
Sun Jun 02 18:53:12 EDT 2024
Wed Nov 06 06:03:38 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2016
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a533t-64c770c2f195133ffa633ef55280aec6d87c4d625a537db7bde10a24d4b998a3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
OpenAccessLink https://dx.doi.org/10.1155/2016/8797568
PQID 1750366180
PQPubID 237780
PageCount 11
ParticipantIDs proquest_miscellaneous_1793296340
proquest_journals_1750366180
crossref_primary_10_1155_2016_8797568
hindawi_primary_10_1155_2016_8797568
emarefa_primary_1110666
PublicationCentury 2000
PublicationDate 2016-01-01
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – month: 01
  year: 2016
  text: 2016-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Cairo, Egypt
PublicationPlace_xml – name: Cairo, Egypt
– name: New York
PublicationTitle Journal of sensors
PublicationYear 2016
Publisher Hindawi Publishing Corporation
Hindawi Limited
Publisher_xml – name: Hindawi Publishing Corporation
– name: Hindawi Limited
References Chitra J. Girish R. Lavy L. SeAK: secure authentication and key generation protocol based on dual antennas for wireless body area networks Radio Frequency Identification: Security and Privacy Issues 2014 Springer 74 89 Lecture Notes in Computer Science
(3) 2010; 47
(10) 2008; 17
(5) 2008; 52
Perring A. Canetti R. Tygar J. The TESLA broadcast authentication protocol RSA CryptoBytes 2002 UC Berkeley and IBM Research 2 13
Cherukuri S. Venkatasubramanian K. Gupta S. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body Proceedings of the International Conference on Parallel Processing Workshops (ICPPW '03) 2003 IEEE 432 439 10.1109/icppw.2003.1240399
Luk M. Mezzour G. Perrig A. Gligor V. MiniSec: a secure sensor network communication architecture Proceedings of the 6th International Symposium on Information Processing in Sensor Networks April 2007 Cambridge, UK IEEE 479 488 10.1145/1236360.1236421 2-s2.0-35348897342
(12) 2006; 24
Ballarini P. Miller A. Model checking medium access control for sensor networks Proceedings of the 2nd International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (ISoLA '06) November 2006 Paphos, Cyprus IEEE 255 262 10.1109/isola.2006.16
(13) 1981; 29
Karlof C. Sastry N. Wagner D. TinySec: a link layer security architecture for wireless sensor networks Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04) November 2004 ACM 162 175 2-s2.0-26444574670
Liu Y. Sun J. Dong J. S. Developing model checkers using PAT Proceedings of the 8th International Symposium on Automated Technology for Verification and Analysis (ATVA '10) 2010 Singapore 371 377
Lowe G. Breaking and fixing the Needham-Schroeder public-key authentication protocol sing CSP and FDR Proceedings of the 2nd International Workshop on Tools and Algorithms for Construction and Analysis of Systems (TACAS '96) 1996 1055 Springer Lecture Notes in Computer Science
(1) 2012; 25
1
12
13
3
(14) 2014
(2) 1996; 1055
5
(8) 2002
10
References_xml – volume: 24
  start-page: 247
  issue: 2
  year: 2006
  end-page: 260
  ident: 12
  article-title: Location-based compromise-tolerant security mechanisms for wireless sensor networks
  publication-title:
– volume: 29
  start-page: 350
  issue: 2
  year: 1981
  end-page: 357
  ident: 13
  article-title: On the security of public key protocols
  publication-title:
– volume: 52
  start-page: 2532
  issue: 13
  year: 2008
  end-page: 2542
  ident: 5
  article-title: Dynamic duty cycle and adaptive contention window based QoS-MAC protocol for wireless multimedia sensor networks
  publication-title:
– volume: 47
  start-page: 81
  issue: 1
  year: 2010
  end-page: 97
  ident: 3
  article-title: Formal analysis of security protocols for wireless sensor networks
  publication-title:
– volume: 17
  start-page: 307
  issue: 7
  year: 2008
  end-page: 322
  ident: 10
  article-title: Model checking CSP revisited: introducing a process analysis toolkit
  publication-title:
– volume: 25
  start-page: 545
  issue: 4
  year: 2012
  end-page: 551
  ident: 1
  article-title: Improved location-based compromise-tolerant security mechanisms for wireless sensor networks
  publication-title:
– volume: 1055
  volume-title: Breaking and fixing the Needham-Schroeder public-key authentication protocol sing CSP and FDR
  year: 1996
  ident: 2
– ident: 5
  doi: 10.1016/j.comnet.2008.05.009
– ident: 13
  doi: 10.1109/TIT.1983.1056650
– start-page: 74
  volume-title: SeAK: secure authentication and key generation protocol based on dual antennas for wireless body area networks
  year: 2014
  ident: 14
– ident: 12
  doi: 10.1109/JSAC.2005.861382
– ident: 1
  doi: 10.3969/j.issn.1004-1699.2012.04.026
– ident: 3
  doi: 10.2478/v10127-010-0032-7
– start-page: 2
  volume-title: The TESLA broadcast authentication protocol
  year: 2002
  ident: 8
– ident: 10
  doi: 10.1007/978-3-540-88479-8-22
SSID ssj0063733
Score 2.0794532
Snippet Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of...
SourceID proquest
crossref
hindawi
emarefa
SourceType Aggregation Database
Publisher
StartPage 1
SubjectTerms Authentication
Automation
Formal method
Mathematical models
Networks
Remote sensors
Security
Wireless networks
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3dS8MwED90Y6AP4rfTKRH0saxfSTZfZJONITiGTtlbSZsUha2dW4f433vp0m0gKPShNOEKl-TufpdLfgA3kSPQr0bUkraILF_G1Aqpx6wmumK0mDiLYp3Qf-qz3qv_OKIjk3Cbm7LKwibmhlqmkc6R1x294YbOpGHfTz8tzRqld1cNhcY2lF1ECnYJyu1Of_Bc2GLm8ZxM3mG4lLhLR0XpO6WI-h1Wb_Amp_qa1Q2nVFETgS_oqSrvGhd_ffyy07nz6e7DnokaSWs5zAewpZJD2N24S_AIsu4snRBdzDpG40VeEJ6mM9JfVnnPSZau29qp_EZZSqya70hXx65joqnR9AF1IhJJ3lB0bHJ6BJ8Xw3VH8joDMmgNj2HY7QwfepahVLAExnWZxfyIcztyY6epiV3iWDDPUzGlbsMWKmKywSNfIibC7lyGPJTKsYXrSz9EXCa8EyglaaLOgDSZo1z8iLKYH9oqRKQoPCZc4SKKi8Mq3BYqDabLizOCHHBQGmjVB0b1VTg1-l53w5AEUVUVboz-_xFQKwYnMOtvHqxnSxWuV824cvR2iEhUutB9MHZF--Pb53-LuIAd_cNl4qUGpWy2UJcYimThlZlvP40_2is
  priority: 102
  providerName: ProQuest
Title From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT
URI https://search.emarefa.net/detail/BIM-1110666
https://dx.doi.org/10.1155/2016/8797568
https://www.proquest.com/docview/1750366180
https://search.proquest.com/docview/1793296340
Volume 2016
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3rS8MwED90IugH8e10jgj6sdhXktZvm6wOwSHblPmppE2Kwmxlq4j_vZcum68PCoU-kl7hknv8LtccwGnqCLSrKbWkLVLLlxm1EuoxK0RTjBoTZ1GmA_o3Pda9869HdGQ2SZr-XsJHa4fw3GHnAQ85ZcEyLAeBlr9-dzRXuMzjVcV4h6G8cJeO5vntP979ZnlW1bPACzRHq48a_L49_VLGlYWJNmHDuIakNRvLLVhS-Tasf9kwcAfKaFI8E52xOkYNRQaIQYsJ6c1SuaekLD7b2oV8R1pKLJovSKQd1DHR9c_0X-hE5JLcI-nMBO4IHgNT0I5UyQTktjXchWHUGV52LVM3wRLovJUW81PO7dTNnFBXb8kywTxPZZS6gS1UymTAU18i8MHuXCY8kcqxhetLP0HwJbw9qOVFrg6AhMxRLj5EWsxPbJUgHBQeE65wEaplSR3O5iyNX2a7Y8QVqqA01qyPDevrsG_4_dkN_Q6ETnU4Nfz_g0BjPjixEbJp7Og1WPQvArsOJ4tmFA-95iFyVbzqPuigopLx7cP_fekI1vTtLMrSgFo5eVXH6HeUSRPnXnTVhJVW67rzgOd2p3fbb1Zz8QP2GNLT
link.rule.ids 315,783,787,866,881,12777,21400,27936,27937,33385,33386,33756,33757,43612,43817,74363,74630
linkProvider Hindawi Publishing
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3dT9swED8NJgQ8IAYDOspmJHiMyIc_2r0gQIRuKxVSy9S3yIkdbRIk0AYh_nvuUodWmjSkPESxdZHO9u_udz77AI6yQKNdzYRnfJ153OTCS0UkvS6aYkRMnEU5BfSvB7J3y3-OxdgF3KYurbLBxBqoTZlRjPwkoA03NCYd__Th0aOqUbS76kpoLMFHHqGtppPi8VWDxDJSdSn5QOJCUqEYN4nvQiDnD-RJR3WVoEtWF0zSir3X-IJ2auUPseLnv_-gdG164k3YcD4jO5sN8if4YIstWF-4SXAbqnhS3jNKZb1D6GJDJKflhA1mOd5TVpXztvPSvKAsq9-av7OYPNc7RoXR6Hg604Vhv1F07iJ6DJ-hq3TH6iwDdnM2-gyj-HJ00fNcQQVPo1dXeZJnSvlZmAddKuuS51pGkc2FCDu-tpk0HZVxg4wIuyuTqtTYwNchNzxFVqajHVguysLuAevKwIb4EWVJnvo2RZ6oI6lDHSKHy9MWHDcqTR5m12YkNd0QIiHVJ071Ldh1-p53Q4cEOVULjpz-3xHQbgYncatvmsznSgsO35px3dBmiC5s-UR90HNF9OH-l_-L-AarvdF1P-n_GPzahzX6-SwE04blavJkD9ApqdKv9cx7BTwu27Y
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV3dS9xAEB_aE0t9KK3aetXWFfQxXD72464voq1Bqx6HXsu9hU12lwqa6F2k9L93JrfxBMFCHkJ2mcBkdmZ-s7_sAOwWkca4WojAhLoIuHEiyEUigwGGYvSYaEWOCvrnQ3n8i_-ciInnP808rbL1iY2jNlVBNfJeRBtuGEz6Yc95WsToR7p_exdQBynaafXtNF7DkuIyCTuwdHg0HF20flkmqmksH0lcVioWk5YGL0QvJspXXw2UoCNXnwSoZXuj8Qaj1vIfwsh_r5757CYQpe_hnc8g2cH8k3-AV7ZchZUn5wquQZ1OqxtGxNZrdGTsEqFqNWXDOeN7xupqMXZYmX8oy-rH4W8spTz2mlGbNPpZnenSsN8o2vn6HsPr0ve9Yw3ngI0OxuswTo_G348D314h0Jjj1YHkhVJhEbtoQE1enNMySawTIu6H2hbS9FXBDeIjnK5MrnJjo1DH3PAcMZpOPkKnrEq7AWwgIxvjQ5QleR7aHFGjTqSOdYyIzuVd2GtVmt3OD9HIGvAhREaqz7zqu_DJ63sxDdMTRFhd2PX6_4-ArfbjZH4tzrKF5XRh53EYVxFtjejSVvc0B_NY9EU8_PyyiG14g2aXnZ0MTzfhLb17Xo_Zgk49vbdfMEOp86_e9B4AcvThUw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=From+Wireless+Sensor+Networks+to+Wireless+Body+Area+Networks%3A+Formal+Modeling+and+Verification+on+Security+Using+PAT&rft.jtitle=Journal+of+sensors&rft.au=Chen%2C+Bo&rft.au=Li%2C+Shijian&rft.au=Yu%2C+Zhenbo&rft.au=Chen%2C+Tieming&rft.date=2016-01-01&rft.pub=Hindawi+Publishing+Corporation&rft.issn=1687-725X&rft.eissn=1687-7268&rft.volume=2016&rft.issue=2016&rft.spage=1&rft.epage=11&rft_id=info:doi/10.1155%2F2016%2F8797568&rft.externalDBID=ADJCN&rft.externalDocID=1110666
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1687-725X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1687-725X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1687-725X&client=summon