Automated security analysis techniques in MANET routing protocols

被引:0
|
作者
机构
[1] Mao, Liqiang
[2] Huang, Ying
来源
| 1600年 / Science Press卷 / 43期
关键词
Automation - Mobile security - Mobile ad hoc networks - Network security - Security systems;
D O I
10.3969/j.issn.1001-2400.2016.06.010
中图分类号
学科分类号
摘要
Automated security analysis techniques in Mobile ad hoc network (MANET) routing protocols has become a hot research field. We have developed an automated evaluation process to analyze security properties of SRP and Ariadne. Using the automated security evaluation process, we can produce and analyze all topologies for a given network size. The NDA attackers and routing protocols are modeled in SPIN, and the route corruption attack is found automatically, which indicates the effectiveness of automated analysis of MANET route protocols using SPIN. © 2016, The Editorial Board of Journal of Xidian University. All right reserved.
引用
收藏
相关论文
共 50 条
  • [1] SURVEYING SECURITY ANALYSIS TECHNIQUES IN MANET ROUTING PROTOCOLS
    Andel, Todd R.
    Yasinsac, Alec
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2007, 9 (04): : 70 - 84
  • [2] Routing Protocols and Security Issues in MANET
    Kumar, Sandeep
    Goyal, Monika
    Goyal, Deepak
    Poonia, Ramesh C.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 818 - 824
  • [3] Performance Analysis of Security Attacks and Improvements of Routing Protocols in MANET
    Singh, Kuldeep
    Boparai, Amanat
    Handa, Vrinda
    Rani, Sudesh
    [J]. 2015 SECOND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, COMPUTER ENGINEERING, AND SOCIAL MEDIA (CSCESM), 2015, : 163 - 169
  • [4] Privacy and Security on Anonymous Routing Protocols in MANET
    Kumari, E. Hemalatha Jai
    Kannammal, A.
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 431 - +
  • [5] A Comparative Performance Analysis of MANET Routing Protocols under Security Attacks
    Khan, Muhammad Saleem
    Jadoon, Qasim Khan
    Khan, Majid I.
    [J]. MOBILE AND WIRELESS TECHNOLOGY 2015, 2015, 310 : 137 - 145
  • [6] Trust Based Security in MANET Routing Protocols: A Survey
    Poonam
    Garg, K.
    Misra, M.
    [J]. PROCEEDINGS OF THE FIRST AMRITA ACM-W CELEBRATION OF WOMEN IN COMPUTING IN INDIA (A2WIC), 2010,
  • [7] Vulnerability Analysis and Security Framework (BeeSec) for Nature Inspired MANET Routing Protocols
    Mazhar, Nauman
    Farooq, Muddassar
    [J]. GECCO 2007: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, 2007, : 102 - 109
  • [8] Security analysis of routing protocol for MANET
    Wang, Ying-long
    Wang, Ji-zhi
    Wang, Mei-qin
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 920 - 923
  • [9] Performance Analysis of Different MANET Routing Protocols
    Mukherjee, Srijan
    Mohapatra, Hitesh
    [J]. 2024 5TH INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY, ICITIIT 2024, 2024,
  • [10] Analysis of Multicast Routing Protocols for Secure Manet
    Maragatharajan, M.
    Balakannan, S. P.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT TECHNIQUES IN CONTROL, OPTIMIZATION AND SIGNAL PROCESSING (INCOS), 2017,