Security

Formal Reasoning About Physical Properties of Security Protocols

Free registration required

Executive Summary

Traditional security protocols are mainly concerned with authentication and key establishment and rely on predistributed keys and properties of cryptographic operators. In contrast, new application areas are emerging that establish and rely on properties of the physical world. Examples include protocols for secure localization, distance bounding, and secure time synchronization. The authors present a formal model for modeling and reasoning about such physical security protocols. Their model extends standard, inductive, trace-based, symbolic approaches with a formalization of physical properties of the environment, namely communication, location, and time.

  • Format: PDF
  • Size: 494.35 KB