期刊文献+

利用类型推理验证Ad Hoc安全路由协议 被引量:7

Verifying Mobile Ad-Hoc Security Routing Protocols with Type Inference
下载PDF
导出
摘要 提出一种基于类型推理的移动Ad-Hoc网络安全路由协议的形式化验证方法.定义了一种邻域限制通信演算NCCC(neighborhood-constrained communication calculus),包括演算的语法和基于规约的操作语义,在类型系统中描述了移动Ad-Hoc网络路由协议的安全属性,定义了近似攻击消息集用以精简Dolev-Yao攻击模型.还给出了该方法的一个协议验证实例.基于类型推理,该方法不仅能够验证协议的安全性,也可以得出针对协议的攻击手段.因为攻击集的精简,有效地缩减了推理空间. A type-inference-based formal method is proposed for verifying an ad-hoc security routing protocol in this paper. A calculus, called NCCC (neighborhood-constraint communication calculus), is defined to specify the protocol. The security property of the protocol is described with typing rules in a type system. Based on the Dolev-Yao model, an attacker model, called the message set of protocol format, is refined. At last, the simplified version of SAODV (secure ad hoc on-demand routing protocol) is verified with this method. With the typeinference-based formal method, not only is the security of protocols verified, but also the attacke examples are predicted. The complexity of inference is reduced significantly for refining the message set of protocol.
作者 李沁 曾庆凯
出处 《软件学报》 EI CSCD 北大核心 2009年第10期2822-2833,共12页 Journal of Software
基金 国家自然科学基金Nos.60773170 60721002 90818022 国家高技术研究发展计划(863)No.2006AA01Z432 高等学校博士学科点专项科研基金No.200802840002~~
关键词 安全协议验证 ad-hoc网络协议 安全路由协议 类型推理 verification of security protocol ad-hoc protocol security routing protocol type inference
  • 相关文献

参考文献1

二级参考文献2

共引文献68

同被引文献88

  • 1方旭明,马忠建.无线Mesh网络的跨层设计理论与关键技术[J].西南交通大学学报,2005,40(6):711-719. 被引量:22
  • 2季晓君,田畅,张毓森.安全DSR路由协议分析与设计[J].通信学报,2006,27(3):136-140. 被引量:7
  • 3朱西平,方旭明,靳蕃.基于误比特率计算的三维Ad Hoc传感器网络连接性分析[J].铁道学报,2006,28(5):99-103. 被引量:2
  • 4沈强,方旭明.基于帧投递率的无线Mesh网络DSR路由协议[J].西南交通大学学报,2007,42(2):200-205. 被引量:4
  • 5BROOKS R R, PILLAI B, RACUNAS S, et al. Mobile network analysis using probabilistic connectivity matrices [J]. IEEE Transactions on Systems, Man and Cybernetics, Part C : Applications and Reviews, 2007, 37 (4) : 694-702.
  • 6JIA W, WANG J. Analysis of connectivity for sensor networks using geometrical probability[ J]. lEE Proceedings Communications, 2006, 153 ( 2 ) : 305- 312.
  • 7SANTI P. The critical transmitting range for connectivity in mobile ad hoc networks [ J ]. IEEE Transactions on Mobile Computing, 2005, 4(3): 310-317.
  • 8BOYER J, FALCONER D D, YANIKOMEROGLU H. Cooperative connectivity models for wireless relay networks [ J ]. IEEE Transactions on Wireless Communications, 2007, 6(6): 1992-2000.
  • 9MARCO G D, LONGO M, POSTIGLIONE F. Connectivity of ad hoc networks with link asymmetries induced by shadowing[ J ]. IEEE Communications Letters, 2007, 11 (6) : 495-497.
  • 10DOUSSE O, BACCELLI F, THIRAN P. Impact. of interferences on connectivity in ad hoc networks [ J ]. IEEE/ACM Transactions on Networking, 2005, 13(2) : 425-436.

引证文献7

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部