期刊文献+

用逻辑方法验证移动Ad Hoc网络协议 被引量:1

Formal modeling and analysis in a logic for mobile Ad Hoc networks
下载PDF
导出
摘要 针对移动Ad Hoc网络节点移动和无线广播通信特征,引入移动算子和广播算子,扩展形式逻辑LS2,提出了建模和分析移动Ad Hoc网络安全系统的逻辑ELS2.ELS2把网络模型化为不同位置上执行程序的线程复合,把攻击者模型化为与协议参与方并发运行的线程.ELS2中提出网络迹概念,描述网络节点内部计算和外部交互,以及节点移动导致的网络进化过程,并在网络迹上定义谓词公式和模态公式的语义,分析网络协议属性.ELS2证明系统中,设计了捕获程序行为直观属性的新公理.最后,在ELS2逻辑中建模并分析了移动IP注册协议正确性属性. Aiming at the features of mobility and wireless broadcast communication of node,in order to model and analyze secure systems for mobile Ad Hoc networks,two constructors,i.e.mobility and broadcast,are introduced in LS2(logic of secure systems).So LS2 is extended to be ELS2.In ELS2,the network is modeled as the combination of threads with different physical locations.A thread is a sequentially executing program.The threads execute programs of secure systems.The attacker is also modeled as a thread which runs concurrently with the threads of system participants.The concept of network trace is proposed in this paper.This concept describes the process of the network evolution caused by system behaviors,such as internal computation,external interaction and mobility of nodes.On the network trace,semantic of predicates and modal formulas are defined,and properties of a system can be analyzed.New axioms are designed in ELS2.Intuitive properties of system behaviors can be captured by these axioms.Finally,in ELS2,mobile IP registration protocol is described and its correctness property is analyzed.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第2期258-265,共8页 Journal of Southeast University:Natural Science Edition
基金 国家高技术研究发展计划(863计划)资助项目(2007AA01Z429) 国家自然科学基金资助项目(60972078) 甘肃省高等学校基本科研业务费资助项目(0914ZTB186) 兰州理工大学博士基金资助项目(BS14200901) 网络安全与密码技术福建省高校重点实验室开放课题资助项目(09A006) 甘肃省自然科学基金资助项目(1014RJZA005)
关键词 AD HOC网络 形式逻辑 网络迹 移动IP注册协议 Ad Hoc networks logic network trace mobile IP registration protocol
  • 相关文献

参考文献10

  • 1Datta A, Roy A, Mitchell J. Protocol composition logic (PCL) [J]. Electronic Notes in Theoretical Computer Science, 2007, 172( 1 ): 311- 358.
  • 2Datta A, Franklin J, Garg D, et al. A logic of secure systems and its application to trusted computing [ C ]// Proceedings of Security and Privacy, IEEE Symposium. Washington DC, 2009 : 221 - 236.
  • 3Pura M L, Patriciu V V, Bica I. Formal verification of secure Ad Hoc routing protocols using AVISPA: ARAN case study [ C ]//Proceedings of 4th Conference on Eu- ropean Computing Conference. Stevens Point, WI, USA, 2010:200-206.
  • 4Godskesen J C. A calculus for mobile Ad Hoc networks with static location binding [ J ]. Electronic Notes in Theoretical Computer Science, 2009, 242 ( 1 ) : 161 - 183.
  • 5李沁,曾庆凯.利用类型推理验证Ad Hoc安全路由协议[J].软件学报,2009,20(10):2822-2833. 被引量:7
  • 6Andel T R. Formal security evaluation of Ad Hoc routing protocols [ D ]. Florida: College of Arts and Sci- ences, Florida State University, 2007.
  • 7Yang C Y, Shiu C Y. A secure mobile IP registration protocol [ J ]. International Journal of Network Security, 2005, 1(1): 38-45.
  • 8Sufatrio K Y L. Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication [ C ]//Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms and Networks. Washington DC, 1999 : 364 - 369.
  • 9Dolev D, Yao A. On the security of public-key protocols [J]. IEEE Transactions on Information Theory, 1983, 29(2) : 198-208.
  • 10冯涛,郭显,马建峰,李兴华.可证明安全的节点不相交多路径源路由协议[J].软件学报,2010,21(7):1717-1731. 被引量:9

二级参考文献4

共引文献13

同被引文献22

  • 1GEORGE X,CHRISTOPHER N, VERVERIDIS V A Stef al. A sur-vey of information-centric networking research[J]. CommunicationsSurveys and Tutorials, 2014, 16(2):1024-1049.
  • 2AHLGREN B, DANNEWITZ C, IMBRENDA C. A survey of infor-mation-centric networking[J]. IEEE Communications Magazine, 2012,50(7): 26-36.
  • 3ZHANG L X, KCCLAFFY,PATRICK C. Named data networking[J].ACM SIGCOMM Computer Communicaticni Review, 2014,44(3): 66-73.
  • 4VAN J, DIANA K, SMETTERS J D, et al. Networking named con-tent[A]. Communications of the ACM, Proceeding of the 5th Interna-tional Conference on Emerging Networking Experiments and tech-nologies[C]. 2009.1-12.
  • 5MARICA A, CLAUDIA C, ANTONELLA N. Forwarding strategies innamed data wireless ad hoc networks: design and evaluation[J]. Jour-nal of Network and Computer Applications, 2015, 50: 148-158.
  • 6MEISEL M, PAPPAS V,ZHANG L X. Ad hoc networking via nameddata[A]. Proc of the 5th ACM International Workshop on Mobility inthe Evolving Internet Architecture[C]. New York, NY, USA, 2010.3-8.
  • 7QIN D Y, LI H W, MA L,et al. An ant colony algorithm based conges-tion elusion routing strategy for mobile ad hoc networks[J]. Journal ofHarbin Institute of Technology(New Seriers), 2013,20(3):99-103.
  • 8BY G T, NISHANTH S, RUBEN C,et al. A survey of mobility ininformation-centric networks[J]. Communications of the ACM, 2013,56(12):90-98.
  • 9ABDALLAH E Q HASSANEIN H S, ZULKERNINE M. A survey ofsecurity attacks in information-centric networking[J]. IEEE Commu-nications Surveys & Tutorials, 2015,17(3): 1441-1454.
  • 10ABDELBERIC, EMILIANO D C, MOHAMED AK,er al. Privacy incontent-oriented networking threats and countermeasures[J]. ACMSIGCOMM Computer Communication Review, 2013,43(3):26-33.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部