期刊文献+

基于串空间的Ad Hoc安全路由协议攻击分析模型 被引量:8

Attack Analysis Model on Ad Hoc Security Routing Protocol Based on Strand Space Model
下载PDF
导出
摘要 根据ad hoc安全路由协议的特点,分析串空间理论的优势和不足,并在串空间分析协议的基础上,设计出一种返回不存在路由的协议攻击分析模型.以扩展SRP协议为例,验证了模型的正确性. Based on the characteristics of ad hoe disadvantages of the strand space theory are analyzed security routing protocols (SRPs), the advantages and An analysis model for protocol attacks, which leads to a nonexistent route that is accepted by the protocol, is designed on the basis of the strand space model. Finally, this paper demonstrates the usefulness of this model in the case of a security ad hoc routing protocol: Extended SRP.
出处 《软件学报》 EI CSCD 北大核心 2011年第7期1641-1651,共11页 Journal of Software
基金 国家自然科学基金(60872041 61072066) 国家科技部重大专项(2011ZX03005-002) 中央高校基本科研业务费项目(JY10000903001 JY10000901034)
关键词 串空间 攻击分析模型 不存在路由 SRP(security ROUTING protocol)协议 strand space attack analysis model nonexistent route SRP (security routing protocol)
  • 相关文献

参考文献15

  • 1Hu YC,Perrig A,Johnson DB.Ariadne: A secure on-demand routing protocol for ad hoc networks. Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking(MobiCom2002) . 2002
  • 2Zapata MG,Asokan N.Securing ad hoc routing protocols. Proc.of the WiSE 2002 . 2002
  • 3毛立强,马建峰.可证明安全的MANET按需距离矢量路由协议分析[J].西安电子科技大学学报,2008,35(6):1063-1068. 被引量:4
  • 4Fabrega FJT,Herzog JC,Guttman JD.Strand spaces: Why is a security protocol correct?. Proceedings of the 1998 IEEE Symposium on Security and Privacy . 1998
  • 5季晓君,田畅,张毓森.安全DSR路由协议分析与设计[J].通信学报,2006,27(3):136-140. 被引量:7
  • 6Thayer FJ,Herzog JC,Guttman JD.Strand spaces: Proving security protocols correct. Journal of Computer Security . 1999
  • 7李沁,曾庆凯.利用类型推理验证Ad Hoc安全路由协议[J].软件学报,2009,20(10):2822-2833. 被引量:7
  • 8Yang SH,Baras JS.Modeling vulnerabilities of ad hoc routing protocols. Proc.of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks . 2003
  • 9Paulson LC.The inductive approach to verifying cryptographic protocols. Journal of Computer Security . 1998
  • 10Wang JZ,Wang YL.Security analysis for ad hoc routing protocols based on improved strand space. Journal of Software . 2006

二级参考文献31

  • 1慕建君.一种形式化分析安全协议的新模型[J].西安电子科技大学学报,2006,33(3):381-385. 被引量:2
  • 2卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 3Argyroudis P G, O'Mahony D. Secure Routing for Mobile Ad Hoe Networks[J]. IEEE Communication Surveys &Tutorials, 2005, 7(3): 2-21.
  • 4Perkins C E, Royer E M. Ad-hoc On-demand Distance Vector Routing[C]//Proc of WMCSA'99. New Orleans: IEEE Press, 1999: 90-100.
  • 5Papadimitratos P, Haas Z J. Secure Routing for Mobile Ad Hoc Networks[C]//Proc of CNDS2002. San Antonio: Sage Science Press, 2002: 1-13.
  • 6Marshall J D. An Analysis of the Secure Routing Protocol for Mobile Ad Hoc Network Route Discovery: Using Intuitive Reasoning and Formal Verification to Identify Flaws[D]. Florida: Florida State University, 2003.
  • 7Yang S H, Baras J S. Modeling Vulnerabilities of Ad Hoc Routing Protocols[C]//Proc of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. Fairfax: ACM Press, 2003: 12-20.
  • 8Zapata M G, Asokan N. Securing Ad Hoe Routing Protocols[C]//Proc of WiSe'02. Atlanta: ACM Press, 2002: 1-10.
  • 9Buttyan L, Vajda I. Towards Provable Security for Ad Hoe Routing Protocols[C]//Proe of SASN'04. Washington DC: ACM Press, 2004:94-105.
  • 10Acs G, Buttyan L, Vajda I. Provably Secure On-demand Source Routing in Mobile Ad Hoe Networks[EB/OL]. [2008- 06-07]. http://www, hit. brae. hu.

共引文献131

同被引文献94

  • 1孙海波,林东岱,李莉.基于理想的协议安全性分析[J].软件学报,2005,16(12):2150-2156. 被引量:3
  • 2周永彬,张振峰,冯登国.一种认证密钥协商协议的安全分析及改进[J].软件学报,2006,17(4):868-875. 被引量:16
  • 3慕建君.一种形式化分析安全协议的新模型[J].西安电子科技大学学报,2006,33(3):381-385. 被引量:2
  • 4刘学,曹卫彬,刘姣娣,李华.RTK GPS系统在智能化农业机械装备中的应用[J].农机化研究,2007,29(9):182-183. 被引量:7
  • 5全国信息安全标准化技术委员会.信息安全技术:信息系统安全等级保护基本要求[S].2007.
  • 6中华人民共和国质量技术监督局.GBl7859-1999计算机信息系统安全保护等级划分准则[S].1999.
  • 7Harkins D, Carrel D.RFC2409: the Intemet key exchange[Z]. 1998.
  • 8Fabrega F J T, Herzog J C, Guttman J D.Honest ideals on strand spaces[C]//Proc of the llth IEEE Computer Security Foundations Workshop.[S.1.]: IEEE Computer Society Press, 1998.
  • 9Faibrega F J T,Herzog J C,Guttman J D.Strand spaces: proving security protocols correct[J].Joumal of Computer Security, 1999.
  • 10国务院办公厅.国务院关于推进物联网有序健康发展的指导意见[EB/OL].(2013-02-17).http://www.gov.cn/zwgk/2013-02/17/content一2333141.htm2013.

引证文献8

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部