期刊文献+

可证明安全的MANET按需距离矢量路由协议分析 被引量:4

Analysis of provably secure on-demand distance vector routing in MANET
下载PDF
导出
摘要 基于模拟证明方法,Acs等提出了一个MANET安全按需距离矢量路由协议的形式化分析模型,并利用该模型证明了ARAN协议的安全性.对该模型进行了深入分析,指出其中合并相邻敌手节点操作和正确系统状态定义的不合理性,以及ARAN协议安全性证明过程中的错误,并给出了一种针对ARAN协议的攻击方法,表明该协议即使在其分析模型下仍然存在安全漏洞. Based on the simulation paradigm, Acs et al proposed a formal model tailored to the security analysis of on-demand distance vector routing protocols in MANET, and a routing protocol, called ARAN, was proven secure in the model. We indicate the improper manipulations such as mergence of the adjacent adversarial nodes, the improper definition of the correct system state in the model, and the flaw in the proof for ARAN. A new attack to ARAN is presented, which shows that ARAN is not provably secure even in their model.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2008年第6期1063-1068,共6页 Journal of Xidian University
基金 国家高技术研究发展计划(863计划)项目资助(2007AA01Z429 2007AA01Z405) 国家自然科学基金重点项目资助(60633020) 国家自然科学基金资助(60573036 60702059 60503012)
关键词 路由协议 可证明安全 形式化分析 模拟 自组织无线网络 routing protocol provable security formal analysis simulation paradigm
  • 相关文献

参考文献14

  • 1Argyroudis P G, O'Mahony D. Secure Routing for Mobile Ad Hoe Networks[J]. IEEE Communication Surveys &Tutorials, 2005, 7(3): 2-21.
  • 2Perkins C E, Royer E M. Ad-hoc On-demand Distance Vector Routing[C]//Proc of WMCSA'99. New Orleans: IEEE Press, 1999: 90-100.
  • 3Papadimitratos P, Haas Z J. Secure Routing for Mobile Ad Hoc Networks[C]//Proc of CNDS2002. San Antonio: Sage Science Press, 2002: 1-13.
  • 4Marshall J D. An Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery: Using Intuitive Reasoning and Formal Verification to Identify Flaws[D]. Florida: Florida State University, 2003.
  • 5Yang S H, Baras J S. Modeling Vulnerabilities of Ad Hoc Routing Protocols[C]//Proc of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. Fairfax: ACM Press, 2003: 12-20.
  • 6Zapata M G, Asokan N. Securing Ad Hoe Routing Protocols[C]//Proc of WiSe'02. Atlanta: ACM Press, 2002: 1-10.
  • 7Buttyan L, Vajda I. Towards Provable Security for Ad Hoe Routing Protocols[C]//Proe of SASN'04. Washington DC: ACM Press, 2004:94-105.
  • 8Acs G, Buttyan L, Vajda I. Provably Secure On-demand Source Routing in Mobile Ad Hoe Networks[EB/OL]. [2008- 06-07]. http://www, hit. brae. hu.
  • 9Hu Y C, Perrig A, Johnson D. Ariadne: a Secure On-demand Routing Protocol for Ad Hoe Networks[C]//Proc of MobiCom2002. Atlanta: ACM Press, 2002.. 12-23.
  • 10Aes G, Buttyan L, Vajda I. Provable Security of On-demand Distance Vector Routing in Ad Hoc Networks[C]//Proc of ESAS2005, LCNS3813. Berlin: Springer, 2005.. 113-127.

二级参考文献1

共引文献1

同被引文献44

  • 1季晓君,田畅,张毓森.安全DSR路由协议分析与设计[J].通信学报,2006,27(3):136-140. 被引量:7
  • 2Sanzgiri K,Dahill B,and LaFlamme D.Routing for Ad hoc Networks[J].IEEE Journal on Selected Areas in Communications (Special issue on Wireless Ad hoc Networks),2005 23(3):598-610.
  • 3Sanzgiri K,Dahill B,and Levine B.A secure routing protocol for Ad hoc networks[C].Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP).Paris:IEEE Press,2002:78-87.
  • 4Thayer F J,Herzog J C,and Guttman J D.Strand spaces:Why is a Security Protocol Correct[C].Proceedings of the 1998 IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society,1998:160-171.
  • 5Thayer F J,Herzog J C,and Guttman J D.Strand Spaces:proving security protocols correct[J].Journal of Computer Security,1999,7(2,3):191-230.
  • 6Thayer F J,Herzog J C,and Guttman J D.Strand spaces:honest ideals on strand spaces[C].Proceedings of the 1998 IEEE Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society,1998:66-77.
  • 7Acs G,Buttyan L,and Vajda I.Provable security of on-demand distance vector routing in Ad hoc networks[C].Proc of ESA2005.Berlin:Springer,2005,LCNS 3813:113-127.
  • 8Buttyan L, Vajda I. Towards provable security for Ad hoc rou- ting protocols[C]//Proc of SASN' 04. Washington IX;, USA, 2004:94-105.
  • 9Burrows M, Abadi M, Needham R. A logic of authentication[C]. ACM Transactions in Computer Systems, 1990,8 ( 1 ) : 18-36.
  • 10Wang Ying long, Wang Ji-zhi. The Security Analysis for Ad hoc Routing Protocols Based on Improved Strand Space [C]// SP- CA06: 1st International Symposium on Pervasive Computing and Applications. 2006 (1) : 585-588.

引证文献4

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部