uu.seUppsala University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Modelling and analysing a WSN secure aggregation protocol: A comparison of languages and tool support
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Architecture and Computer Communication. (Communication Research)
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computing Science. (Mobility)
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computing Science. (Mobility)
Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computing Science. (Mobility)ORCID iD: 0000-0003-0174-9032
2015 (English)Report (Other academic)
Place, publisher, year, edition, pages
2015.
Series
Technical report / Department of Information Technology, Uppsala University, ISSN 1404-3203 ; 2015-033
National Category
Computer Science Communication Systems
Research subject
Computer Science with specialization in Computer Communication
Identifiers
URN: urn:nbn:se:uu:diva-268453OAI: oai:DiVA.org:uu-268453DiVA: diva2:876767
Projects
ProFuN
Funder
Swedish Foundation for Strategic Research , RIT08-0065
Available from: 2015-12-03 Created: 2015-12-04 Last updated: 2016-07-12Bibliographically approved
In thesis
1. Protocol, mobility and adversary models for the verification of security
Open this publication in new window or tab >>Protocol, mobility and adversary models for the verification of security
2016 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

The increasing heterogeneity of communicating devices, ranging from resource constrained battery driven sensor nodes to multi-core processor computers, challenges protocol design. We examine security and privacy protocols with respect to exterior factors such as users, adversaries, and computing and communication resources; and also interior factors such as the operations, the interactions and the parameters of a protocol.

Users and adversaries interact with security and privacy protocols, and even affect the outcome of the protocols. We propose user mobility and adversary models to examine how the location privacy of users is affected when they move relative to each other in specific patterns while adversaries with varying strengths try to identify the users based on their historical locations. The location privacy of the users are simulated with the support of the K-Anonymity protection mechanism, the Distortion-based metric, and our models of users' mobility patterns and adversaries' knowledge about users.

Security and privacy protocols need to operate on various computing and communication resources. Some of these protocols can be adjusted for different situations by changing parameters. A common example is to use longer secret keys in encryption for stronger security. We experiment with the trade-off between the security and the performance of the Fiat–Shamir identification protocol. We pipeline the protocol to increase its utilisation as the communication delay outweighs the computation.

A mathematical specification based on a formal method leads to a strong proof of security. We use three formal languages with their tool supports in order to model and verify the Secure Hierarchical In-Network Aggregation (SHIA) protocol for Wireless Sensor Networks (WSNs). The three formal languages specialise on cryptographic operations, distributed systems and mobile processes. Finding an appropriate level of abstraction to represent the essential features of the protocol in three formal languages was central.

Place, publisher, year, edition, pages
Uppsala University, 2016. 132 p.
Series
Information technology licentiate theses: Licentiate theses from the Department of Information Technology, ISSN 1404-5117 ; 2016-007
National Category
Computer Science Communication Systems
Research subject
Computer Science with specialization in Computer Communication
Identifiers
urn:nbn:se:uu:diva-298943 (URN)
Supervisors
Projects
ProFuN
Available from: 2016-07-12 Created: 2016-07-12 Last updated: 2016-07-28Bibliographically approved

Open Access in DiVA

No full text

Other links

http://www.it.uu.se/research/publications/reports/2015-033/

Authority records BETA

Cambazoglu, VolkanGutkovas, RamunasÅman Pohjola, JohannesVictor, Björn

Search in DiVA

By author/editor
Cambazoglu, VolkanGutkovas, RamunasÅman Pohjola, JohannesVictor, Björn
By organisation
Computer Architecture and Computer CommunicationComputing Science
Computer ScienceCommunication Systems

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 395 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf