Time filter

Source Type

Ji S.,Xidian University | Pei Q.,Xidian University | Zeng Y.,Key Laboratory of Computer Networks and Information Security of Ministry of Education | Yang C.,Key Laboratory of Computer Networks and Information Security of Ministry of Education | Bu S.-P.,China Institute of Technology
Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011 | Year: 2011

Security protocols for wireless sensor network are designed to provide a variety of security services to secure communications in an unsafe network. It is demanded to verify whether an implementation of a security protocol indeed perform as described in the protocol. In practice, conformance testing is commonly employed to test whether an implementation is conformance with the protocol specification. However, existing conformance testing cannot test and assess the security of the implementation of a security protocol. Therefore, randomness test is added to conformance test, makes it possible to test security functions. In this paper, we seek to overcome the limitation and meet the test requirement. We integrate randomness test with conformance testing to makes it possible to test security functions. One part of SPINS protocol is chosen to illustrate the approach. The experimental results demonstrate that the approach can be used for test security functions of WSN protocols. © 2011 IEEE.


Qi Y.,Xidian University | Pei Q.,Xidian University | Zeng Y.,Key Laboratory of Computer Networks and Information Security of Ministry of Education | Yang C.,Key Laboratory of Computer Networks and Information Security of Ministry of Education | And 2 more authors.
Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011 | Year: 2011

In this paper, we propose an object-oriented attack model to represent a protocol attack in WSN detailedly. The model describes multiple attributes of an attack, including its principle, impact, interdependent relationships with other attacks, etc. Then, on the basis of the attack model and the FSM description method, we present a security testing approach for WSN protocols, in order to evaluate the security of the tested protocols. Finally, we take the TinyPK protocol and Sybil attack for example to implement our design, and the Protocol Security Testing Report shows as expected that the TinyPK cannot resist the Sybil attack Thus, the security testing approach proposed is feasible. © 2011 IEEE.

Loading Key Laboratory of Computer Networks and Information Security of Ministry of Education collaborators
Loading Key Laboratory of Computer Networks and Information Security of Ministry of Education collaborators