Towards Provable Secure Neighbor Discovery in Wireless Networks

ACM Computer and Communications Security Conference (CCS) Sixth Workshop on Formal Methods in Security Engineering (FMSE), pages 31{42, Alexan- dria, VA, USA, October 2008 In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio...

Full description

Saved in:
Bibliographic Details
Main Authors Poturalski, Marcin, Papadimitratos, Panos, Hubaux, Jean-Pierre
Format Journal Article
LanguageEnglish
Published 19.08.2008
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:ACM Computer and Communications Security Conference (CCS) Sixth Workshop on Formal Methods in Security Engineering (FMSE), pages 31{42, Alexan- dria, VA, USA, October 2008 In wireless systems, neighbor discovery (ND) is a fundamental building block: determining which devices are within direct radio communication is an enabler for networking protocols and a wide range of applications. To thwart abuse of ND and the resultant compromise of the dependent functionality of wireless systems, numerous works proposed solutions to secure ND. Nonetheless, until very recently, there has been no formal analysis of secure ND protocols. We close this gap in \cite{asiaccs08}, but we concentrate primarily on the derivation of an impossibility result for a class of protocols. In this paper, we focus on reasoning about specific protocols. First, we contribute a number of extensions and refinements on the framework of [24]. As we are particularly concerned with the practicality of provably secure ND protocols, we investigate availability and redefine accordingly the ND specification, and also consider composability of ND with other protocols. Then, we propose and analyze two secure ND protocols: We revisit one of the protocols analyzed in [24], and introduce and prove correct a more elaborate challenge-response protocol.
DOI:10.48550/arxiv.0808.2586