Logic and Formal Methods

Analysis of authenticated Query Flooding by Probabilistic Means

  • Author(s):

    Peter H. Schmitt
    Frank Werner

  • Source:

    IEEE/IFIP WONS 2008,
    The 5th International Conference on Wireless On-demand Network Systems and Services,
    Garmisch-Partenkirchen, Germany

  • Secure multicast communication is an elementary mechanism in the field of wireless sensor networks, addressing a number of security means and algorithms. Since this security is inherent with the scarce resource of energy, the endeavour in this context is to maximise security while being energy conscious and aware depending on the level of intrusion.
    This paper analyses the energy consumption of a secure authenticated query flooding protocol with a formally probabilistic analysis on the basis of DTMCs. By the use of formal methods we compute for different topologies the intrinsic energy use depending on the level of intrusion. The novelty when choosing the concept of formal methods in the field of wireless sensor networks is the precision of the results. As in simulation series of experiments have to be repeated many times to reach a desired degree of confidence, the presented formal approach is computing these results with a high precision.