期刊文献+

MANET虚假路由形式化验证

Formal Verification Approach for False Route in MANET
下载PDF
导出
摘要 提出了Ad-hoc网络虚假路由攻击的形式化验证和分析方法,主要是在参数化Ad-hoc路由协议串空间模型的基础上采用改进的Athena状态表示法来描述问题域,并采用相应的证明搜索过程来完成目标验证。最后设计实现了虚假路由自动验证系统FRpoofor,用它验证和分析了Ariadne安全路由协议运行环境下某些虚假路由的建立过程,以此说明方法的有效性。 It is a general threaten for MANET routing protocol to create the false routes,so analysis of this threaten is an important goal of routing security research.We proposed an approach to formal verification for the false route in MANET.It allows us to represent the basic objective to be proven with the state representation based on our parameterized strand space model of the Ad-hoc routing protocol,and to apply the adapted proof search procedure to automatically verify the basic objective.At last we completed the automatic verification program,called FRpoofor.As a example,we executed FRpoofor to verify and analyze some false route in secure routing protocol Ariadne.
出处 《计算机科学》 CSCD 北大核心 2012年第2期118-121,共4页 Computer Science
关键词 Ad-hoc路由攻击 形式化分析 串空间 证明搜索 Ad-hoc routing attack Formal analysis Strand space Proof search
  • 相关文献

参考文献14

  • 1Sergio M,Giuli T J,Kevin L,et al.Mitigating Routing Misbeha-vior in Mobile Ad-hoc Network[C]∥MobiCom 2000.Boston:ACM,2000:255-265. 被引量:1
  • 2Hu Y C,Perrig A,Johnson D B.Packet Leashes:A Defense A-gainst Wormhole Attacks in Wireless Ad-hoc Network RoutingProtocols[C]∥INFOCOM’03.San Francisco,USA,2003. 被引量:1
  • 3Wang W C,Lu Y,Bharat B.On Security Study of Two DistanceVector Routing Protocols for Ad-hoc Networks[C]∥PerCom’03.IEEE,2003. 被引量:1
  • 4Sergio M,Giuli T J,Kevin L.On the Survivability of RoutingProtocols in Ad-hoc Wireless Networks[C]∥SecureComm’05.Athens,Greece,September 2005. 被引量:1
  • 5Babakhouya A.A Simulation Analysis of Routing Misbehaviourin Mobile Ad hoc Networks[C]∥the 2nd International Confe-rence on NGMAST’08.Cardiff,Wale,UK,2008. 被引量:1
  • 6Acs G,Buttyán L,Vajda I.Modelling adversaries and securityobjectives for routing protocols in wirless sensor networks[C]∥SASN,2006.2006:49-58. 被引量:1
  • 7Nanz S,Hankin C.A Framework for Security Analysis of Mo-bile Wireless Networks[J].Computer Science,2006,367:203-227. 被引量:1
  • 8桂荆京 张毓森.基于串空间的MANET路由协议安全性分析的新方法.通信学报,2010,:217-222. 被引量:1
  • 9Javier F,Herzog J C,Guttman J D.Strand Spaces:Why is a Se-curity Protocol Correct[C]∥Proc of IEEE Symposium on Secu-rity and Privacy.California:IEEE,1998:1-13. 被引量:1
  • 10Song D,Berezin S,Perrig A.Athena:a novel approach to effi-cient automatic security protocols analysis[J].Journal of Com-puter Security,2010,9(1):47-74. 被引量:1

二级参考文献9

  • 1Thayer F J, Herzog J C, Guttman J D. Strand spaces: Why is a security protocol correct? In: Proc. of 1998 IEEE Symposium on Security and Privacy, 1998 被引量:1
  • 2Guttman J D, F'abrega F J T. Authentication tests. In.. Proc.2000 IEEE Symposium on Security and Privacy. May, IEEE Computer Society Press, 2000 被引量:1
  • 3Song A P D, Berezin S. Athena: a novel approach to effcient automatic security protocol, analysis. Journal of Computer Security,2001(9) :47-74 被引量:1
  • 4http://www. sergeyberezin. com/publications, php 被引量:1
  • 5Needham R, Sehroeder M. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM,1978 被引量:1
  • 6http://www. ics. uci. edu/~isse/index, html 被引量:1
  • 7Perrig A,SOng D X. Looking for diamonds in the desert: Extending automatic protocol generation to three party authentication and key agreement protocols. In:Proc. of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, July 2000 被引量:1
  • 8Berezin S. Model Checking and Theorem Proving: a Unified Framework:[PhD thesis]. Carnegie Mellon University, 2002 被引量:1
  • 9http://www. cag. csail. mit. edu/~kostas/dpls/athena/ 被引量:1

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部