Modeling and Verifying the Ariadne Protocol Using Process Algebra

被引:5
|
作者
Wu, Xi [1 ]
Zhu, Huibiao [1 ]
Zhao, Yongxin [2 ]
Wang, Zheng [3 ]
Liu, Si [4 ]
机构
[1] E China Normal Univ, Inst Software Engn, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Natl Univ Singapore, Sch Comp, Singapore 117548, Singapore
[3] Beijing Inst Control Engn, Beijing, Peoples R China
[4] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划); 新加坡国家研究基金会;
关键词
Formal Verification; CSP; Mobile Ad Hoc Networks; Ariadne; CSP; VERIFICATION;
D O I
10.2298/CSIS120601009W
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Ad Hoc Networks (MANETs) are formed dynamically by mobile nodes without the support of prior stationary infrastructures. In such networks, routing protocols, particularly secure ones are always the essential parts. Ariadne, an efficient and well-known on-demand secure protocol of MANETs, mainly concerns about how to prevent a malicious node from compromising the route. In this paper, we apply the method of process algebra Communicating Sequential Processes (CSP) to model and reason about the Ariadne protocol, focusing on the process of its route discovery. In our framework, we consider the communication entities as CSP processes, including the initiator, the intermediate nodes and the target. Moreover, we also propose an intruder model allowing the intruder to learn and deduce much information from the protocol and the environment. Note that the modeling approach is also applicable to other protocols, which are based on the on-demand routing protocols and have the route discovery process. Finally, we use PAT, a model checker for CSP, to verify whether the model caters for the specification and the non-trivial secure properties, e. g. nonexistence of fake path. Three case studies are given and the verification results naturally demonstrate that the fake routing attacks may be present in the Ariadne protocol.
引用
收藏
页码:393 / 421
页数:29
相关论文
共 50 条
  • [1] Modeling and Verifying the Ariadne Protocol Using CSP
    Wu, Xi
    Liu, Si
    Zhu, Huibiao
    Zhao, Yongxin
    Chen, Lei
    [J]. 2012 IEEE 19TH INTERNATIONAL CONFERENCE AND WORKSHOPS ON ENGINEERING OF COMPUTER BASED SYSTEMS (ECBS), 2012, : 24 - 32
  • [2] Modeling and Verifying HDFS Using Process Algebra
    Xie, Wanling
    Zhu, Huibiao
    Wu, Xi
    Xiang, Shuangqing
    Guo, Jian
    Phan Cong Vinh
    [J]. MOBILE NETWORKS & APPLICATIONS, 2017, 22 (02): : 318 - 331
  • [3] Modeling and Verifying HDFS Using Process Algebra
    Wanling Xie
    Huibiao Zhu
    Xi Wu
    Shuangqing Xiang
    Jian Guo
    Phan Cong Vinh
    [J]. Mobile Networks and Applications, 2017, 22 : 318 - 331
  • [4] Modeling and Verifying Spark on YARN Using Process Algebra
    Yin, Jiaqi
    Zhu, Huibiao
    Fei, Yuan
    Fang, Yucheng
    [J]. 201919TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE 2019), 2019, : 208 - 215
  • [5] Formal Modeling and Verifying Dubbo Using Process Algebra
    Hou, Zhiru
    Yin, Jiaqi
    Zhu, Huibiao
    Vinh, Phan Cong
    [J]. MOBILE NETWORKS & APPLICATIONS, 2023,
  • [6] Modeling and verifying web services choreography using process algebra
    Li, Jing
    He, Jifeng
    Zhu, Huibiao
    Pu, Geguang
    [J]. 31ST IEEE SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2007, : 256 - 265
  • [7] Modeling and Verifying the TTCAN Protocol Using Timed CSP
    Ran, Qinwen
    Wu, Xi
    Li, Xin
    Shi, Jianqi
    Guo, Jian
    Zhu, Huibiao
    [J]. 2014 THEORETICAL ASPECTS OF SOFTWARE ENGINEERING CONFERENCE (TASE), 2014, : 90 - 97
  • [8] Modeling and verifying the topology discovery mechanism of OpenFlow controllers in software-defined networks using process algebra
    Xiang, Shuangqing
    Zhu, Huibiao
    Wu, Xi
    Xiao, Lili
    Bonsangue, Marcello
    Xie, Wanling
    Zhang, Lei
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 2020, 187
  • [9] Modeling and verifying NLSR protocol of NDN for CPS using UPPAAL
    Fei, Yuan
    Zhu, Huibiao
    Yin, Jiaqi
    [J]. JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2023, 35 (07)
  • [10] Verifying Erlang telecommunication systems with the process algebra μCRL
    Guo, Qiang
    Derrick, John
    Hoch, Csaba
    [J]. FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2008, 2008, 5048 : 201 - +