Bioinspired Security Analysis of Wireless Protocols
Fraglets represent an execution model for communication protocols that resembles the chemical reactions in living organisms. The strong connection between their way of transforming and reacting and formal rewriting systems makes a fraglet program amenable to automatic verification. Grounded on past...
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
Springer US
2017
|
Online Access: | http://hdl.handle.net/1721.1/106989 |
_version_ | 1826191332358488064 |
---|---|
author | Petrocchi, Marinella Spognardi, Angelo Santi, Paolo |
author2 | Massachusetts Institute of Technology. Department of Urban Studies and Planning |
author_facet | Massachusetts Institute of Technology. Department of Urban Studies and Planning Petrocchi, Marinella Spognardi, Angelo Santi, Paolo |
author_sort | Petrocchi, Marinella |
collection | MIT |
description | Fraglets represent an execution model for communication protocols that resembles the chemical reactions in living organisms. The strong connection between their way of transforming and reacting and formal rewriting systems makes a fraglet program amenable to automatic verification. Grounded on past work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary trying to circumvent the intended steps. The results of our analysis confirm the effectiveness of the cryptofraglets framework for the model and analysis of security properties and eventually show its potential to identify and uncover protocol flaws. |
first_indexed | 2024-09-23T08:54:16Z |
format | Article |
id | mit-1721.1/106989 |
institution | Massachusetts Institute of Technology |
language | English |
last_indexed | 2024-09-23T08:54:16Z |
publishDate | 2017 |
publisher | Springer US |
record_format | dspace |
spelling | mit-1721.1/1069892022-09-26T09:06:57Z Bioinspired Security Analysis of Wireless Protocols Petrocchi, Marinella Spognardi, Angelo Santi, Paolo Massachusetts Institute of Technology. Department of Urban Studies and Planning Massachusetts Institute of Technology. SENSEable City Laboratory Santi, Paolo Fraglets represent an execution model for communication protocols that resembles the chemical reactions in living organisms. The strong connection between their way of transforming and reacting and formal rewriting systems makes a fraglet program amenable to automatic verification. Grounded on past work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary trying to circumvent the intended steps. The results of our analysis confirm the effectiveness of the cryptofraglets framework for the model and analysis of security properties and eventually show its potential to identify and uncover protocol flaws. Registro.it project My Information Bubble MIB 2017-02-17T21:57:53Z 2017-02-17T21:57:53Z 2016-03 2016-05-23T12:16:59Z Article http://purl.org/eprint/type/JournalArticle 1383-469X 1572-8153 http://hdl.handle.net/1721.1/106989 Petrocchi, Marinella, Angelo Spognardi, and Paolo Santi. “Bioinspired Security Analysis of Wireless Protocols.” Mobile Netw Appl 21, no. 1 (February 2016): 139–148. en http://dx.doi.org/10.1007/s11036-016-0702-z Mobile Networks and Applications Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. Springer Science+Business Media New York application/pdf Springer US Springer US |
spellingShingle | Petrocchi, Marinella Spognardi, Angelo Santi, Paolo Bioinspired Security Analysis of Wireless Protocols |
title | Bioinspired Security Analysis of Wireless Protocols |
title_full | Bioinspired Security Analysis of Wireless Protocols |
title_fullStr | Bioinspired Security Analysis of Wireless Protocols |
title_full_unstemmed | Bioinspired Security Analysis of Wireless Protocols |
title_short | Bioinspired Security Analysis of Wireless Protocols |
title_sort | bioinspired security analysis of wireless protocols |
url | http://hdl.handle.net/1721.1/106989 |
work_keys_str_mv | AT petrocchimarinella bioinspiredsecurityanalysisofwirelessprotocols AT spognardiangelo bioinspiredsecurityanalysisofwirelessprotocols AT santipaolo bioinspiredsecurityanalysisofwirelessprotocols |