A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network protocols

被引:0
|
作者
Li, Qin [1 ]
Zeng, Qingkai [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Dept Comp Sci & Technol, Nanjing, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a calculus of concurrent objects for specification and security analysis of Ad Hoc security protocols. The communicating nodes and the network are modeled by objects, while the interactions between them are modeled by asynchronous method invocations. The internal state of an object is represented by a constant method which can be overridden. The approach is complemented by a control flow analysis which can be used to automatically check properties such as security routing. The attacker model is integrated into the analysis as set values containing the knowledge of the attacker.
引用
收藏
页码:232 / 239
页数:8
相关论文
共 50 条
  • [1] Verifying mobile ad-hoc security routing protocols with type inference
    Li, Qin
    Zeng, Qing-Kai
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (10): : 2822 - 2833
  • [2] Modeling and Verifying Ad Hoc Routing Protocols
    Arnaud, Mathilde
    Cortier, Veronique
    Delaune, Stephanie
    2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 59 - 74
  • [3] Modeling and verifying ad hoc routing protocols
    Arnaud, Mathilde
    Cortier, Veronique
    Delaune, Stephanie
    INFORMATION AND COMPUTATION, 2014, 238 : 30 - 67
  • [4] Security challenges for routing protocols in mobile ad hoc network
    Kakade, Kiran Shrimant
    Rajesh, C.
    Veena, T.
    Sivakumar, P.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (03) : 344 - 356
  • [5] Security of Ad Hoc Network
    Zhou Yajian Yang Yixian(Beijing University of Posts and Telecommunications
    ZTECommunications, 2007, (04) : 24 - 26
  • [6] An Overview of Ad Hoc Network Security
    Yang, Fan
    Zheng, Yulan
    Xiong, Ping
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 129 - 137
  • [7] Optimizing routing protocols for ad hoc network
    Rastogi, Saurabh
    2006 IEEE International Conference on Mobile Adhoc and Sensor Systems, Vols 1 and 2, 2006, : 803 - 808
  • [8] A Calculus for the Analysis of Wireless Network Security Protocols
    Ballardin, Francesco
    Merro, Massimo
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 206 - 222
  • [9] Simulation and Analysis of Protocols in Ad Hoc Network
    Huang, Runcai
    Zhuang, Yiwen
    Cao, Qiying
    Huang, Runcai
    ICECT: 2009 INTERNATIONAL CONFERENCE ON ELECTRONIC COMPUTER TECHNOLOGY, PROCEEDINGS, 2009, : 169 - +
  • [10] TESTING AND VERIFYING CONCURRENT OBJECTS
    WING, JM
    GONG, C
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 1993, 17 (1-2) : 164 - 182