Graph grammar modeling and verification of ad hoc routing protocols

被引:0
|
作者
Saksena, Mayank [1 ]
Wibling, Oskar [1 ]
Jonsson, Bengt [1 ]
机构
[1] Dept Informat Technol, S-75105 Uppsala, Sweden
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a technique for modeling and automatic verification of network protocols, based on graph transformation. It is suitable for protocols with a potentially unbounded number of nodes, in which the structure and topology of the network is a central aspect, such as routing protocols for ad hoc networks. Safety properties are specified as a set of undesirable global configurations. We verify that there is no undesirable configuration which is reachable from an initial configuration, by means of symbolic backward reachability analysis. In general, the reachability problem is undecidable. We implement the technique in a graph grammar analysis tool, and automatically verify several interesting nontrivial examples. Notably, we prove loop freedom for the DYMO ad hoc routing protocol. DYMO is currently on the IETF standards track, to potentially become an Internet standard.
引用
下载
收藏
页码:18 / 32
页数:15
相关论文
共 50 条
  • [1] Automatized verification of ad hoc routing protocols
    Wibling, O
    Parrow, J
    Pears, A
    FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2004, PROCEEDINGS, 2004, 3235 : 343 - 358
  • [2] On Performance Modeling of Ad Hoc Routing Protocols
    Saleem, Muhammad
    Khayam, Syed Ali
    Farooq, Muddassar
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010, : 1 - 13
  • [3] Modeling and Verifying Ad Hoc Routing Protocols
    Arnaud, Mathilde
    Cortier, Veronique
    Delaune, Stephanie
    2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 59 - 74
  • [4] On Performance Modeling of Ad Hoc Routing Protocols
    Muhammad Saleem
    SyedAli Khayam
    Muddassar Farooq
    EURASIP Journal on Wireless Communications and Networking, 2010
  • [5] Modeling and verifying ad hoc routing protocols
    Arnaud, Mathilde
    Cortier, Veronique
    Delaune, Stephanie
    INFORMATION AND COMPUTATION, 2014, 238 : 30 - 67
  • [6] Methodology for formal verification of routing Protocols for ad hoc wireless networks
    Camara, D.
    Loureiro, A. A. F.
    Filali, F.
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 705 - +
  • [7] On automating the verification of secure ad-hoc network routing protocols
    Ta Vinh Thong
    Levente Buttyán
    Telecommunication Systems, 2013, 52 : 2611 - 2635
  • [8] On automating the verification of secure ad-hoc network routing protocols
    Ta Vinh Thong
    Buttyan, Levente
    TELECOMMUNICATION SYSTEMS, 2013, 52 (04) : 2611 - 2635
  • [9] Modeling uncertainties in proactive routing protocols for ad hoc networks
    Idoudi, Hanen
    Molnar, Miklos
    Beighith, Abdelfatteh
    Cousin, Bernard
    MEDIA CONVERGENCE: MOVING TO THE NEXT GENERATION, 2007,
  • [10] Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols
    Andel, Todd R.
    Yasinsac, Alec
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (02) : 3 - 14