Award Abstract # 0627354
CT-ISG: Specification and Verification Challenges for Security Protocols in Sensor Networks

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: IOWA STATE UNIVERSITY OF SCIENCE AND TECHNOLOGY
Initial Amendment Date: August 30, 2006
Latest Amendment Date: June 23, 2009
Award Number: 0627354
Award Instrument: Continuing Grant
Program Manager: carl landwehr
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2006
End Date: August 31, 2010 (Estimated)
Total Intended Award Amount: $0.00
Total Awarded Amount to Date: $366,000.00
Funds Obligated to Date: FY 2006 = $250,000.00
FY 2007 = $100,000.00

FY 2009 = $16,000.00
History of Investigator:
  • Hridesh Rajan (Principal Investigator)
    hridesh@iastate.edu
  • Wensheng Zhang (Co-Principal Investigator)
Recipient Sponsored Research Office: Iowa State University
1350 BEARDSHEAR HALL
AMES
IA  US  50011-2103
(515)294-5225
Sponsor Congressional District: 04
Primary Place of Performance: Iowa State University
1350 BEARDSHEAR HALL
AMES
IA  US  50011-2103
Primary Place of Performance
Congressional District:
04
Unique Entity Identifier (UEI): DQDBM7FGJPC5
Parent UEI: DQDBM7FGJPC5
NSF Program(s): CYBER TRUST,
ITR-CYBERTRUST,
TRUSTWORTHY COMPUTING
Primary Program Source: app-0106 
app-0107 

01000910DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7254, 9178, 9218, 9251, HPCC
Program Element Code(s): 737100, 745600, 779500
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Hridesh Rajan
Iowa State University
Specification and verification challenges for security protocols in sensor networks
0627354
Panel: P060979

Flaws in security protocols are subtle and hard to find. Finding flaws in the security protocols for sensor networks is even harder because they operate under fundamentally different system design assumptions such as event-driven vs. imperative or message passing, resource and bandwidth constraints, hostile deployment scenarios, trivial physical capturing due to the lack of temper resistance, group-oriented behavior, ad hoc and dynamic topologies, open-ended nature, etc. These assumptions lead to complex security protocols, which in turn makes them much harder to verify. Sensor networks are increasingly becoming an integral part of the nation's cyber infrastructure, making it vital to protect them against cryptographic errors in security protocols. There are several existing techniques for specifying and verifying cryptographic protocols; however, none accommodates all the system design assumptions mentioned above. This research is advancing the state of the art in specification and verification of cryptographic protocols for sensor networks. Applications of sensor networks are numerous from military to environmental research. By providing mechanisms to find cryptographic errors in the security protocols for sensor networks this research program is improving the reliability of these networks, making a direct impact on all areas where these networks are utilized. The activities in this research program are collectively contributing to the development of innovative specification and verification mechanisms for security protocols in sensor networks, and training of a diverse cadre of young scientists in programming languages, software engineering, computer networks, and most importantly enhanced computer security.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 13)
Bin Tong, Santosh Panchapakesan, and Wensheng Zhang "A Three-Tier Framework for Intruder Information Sharing in Sensor Networks" IEEE SECON, June 16-20, 2008, San Francisco, CA. , 2008 , p.1
Harish Narayanappa, Mukul S. Bansal, and Hridesh Rajan "Property-Aware Program Sampling" PASTE '10: 9th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, Toronto, Canada, June 2010. , 2010
Hridesh Rajan and Gary T. Leavens "Ptolemy: A Language with Quantified Typed, Events" ECOOP '08: 22nd European Conference on Object-Oriented Programming, July 2008, Paphos, Cyprus. , 2008 , p.1
Min Shao, Sencun Zhu, Wensheng Zhang, and Guohong Cao "pDCS: Security and Privacy Support for Data-Centric Sensor Networks" IEEE INFOCOM, May 6-12, 2007, Anchorage, Alaska. , 2007 , p.1
Nalin Subramanian, Chanjun Yang, and Wensheng Zhang "Securing Distributed Data Storage and Retrieval in Sensor Networks" IEEE International Conference on Pervasive Computing and Communications (PerCom), March 19-23, 2007, White Plains, NY. , 2007 , p.191
Natalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang and Johnny Wong "Specification Synthesis for Monitoring and Analysis of MANET Protocols" International Symposium on Frontiers in Networking with Applications (FINA), May 21-23, 2007, Niagara Falls, ON, Canada. , 2007 , p.1
Robert E. Dyer and Hridesh Rajan "Nu: a Dynamic Aspect-Oriented Intermediate Language Model and Virtual Machine for Flexible Runtime Adaptation" 7th International Conference on Aspect-oriented Software Development (AOSD), March 31 - April 4, 2008, Brussels, Belgium. , 2008 , p.1
Taiming Feng, Chuang Wang, Wensheng Zhang, and Lu Ruan "Confidentiality Protection Schemes for Data Aggregation in Sensor Networks" IEEE INFOCOM, April 15-17, 2008, Phoenix, AZ. , 2008 , p.1
Wensheng Zhang, Chuang Wang, and Taiming Feng "GP2S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data" concise contribution, IEEE PerCom, March 17-21, 2008, Hong Kong, P.R.C. , 2008 , p.1
Wensheng Zhang, Nalin Subramanian, and Guiling Wang "Lightweight and Compromise-Resilient Message Authentication in Sensor Networks" IEEE INFOCOM, April 15-17, 2008, Phoenix, AZ. , 2008 , p.1
Youssef Hanna, David Samuelson, Samik Basu and Hridesh Rajan "Automating Cut-off for Multi-parameterized Systems" CFEM '10: The 12th International Conference on Formal Engineering Methods, Shanghai, China, November 2010. , 2010
(Showing: 1 - 10 of 13)

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page