A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network protocols

被引:0
|
作者
Li, Qin [1 ]
Zeng, Qingkai [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Dept Comp Sci & Technol, Nanjing, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a calculus of concurrent objects for specification and security analysis of Ad Hoc security protocols. The communicating nodes and the network are modeled by objects, while the interactions between them are modeled by asynchronous method invocations. The internal state of an object is represented by a constant method which can be overridden. The approach is complemented by a control flow analysis which can be used to automatically check properties such as security routing. The attacker model is integrated into the analysis as set values containing the knowledge of the attacker.
引用
收藏
页码:232 / 239
页数:8
相关论文
共 50 条
  • [21] Designing routing protocols for mobile ad hoc network
    Hani, ZBA
    Baba, MDB
    4TH NATIONAL CONFERENCE ON TELECOMMUNICATION TECHNOLOGY, PROCEEDINGS, 2003, : 148 - 150
  • [22] Mobile ad hoc network security - a taxonomy
    Alampalayam, S
    Kumar, A
    Srinivasan, S
    7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 839 - 844
  • [23] Security management in hierachical ad hoc network
    Yang, PL
    Zheng, SR
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : B642 - B649
  • [24] Ad hoc network routing and security:: A review
    Zhang, Congzhe
    Zhou, MengChu
    Yu, Ming
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2007, 20 (08) : 909 - 925
  • [25] A novel cryptography for ad hoc network security
    Pi Jian-yong
    Liu Xin-song
    Wu Ai
    Liu Dan
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1448 - +
  • [26] Compiling and verifying security protocols
    Jacquemard, F
    Rusinowitch, M
    Vigneron, L
    LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
  • [27] Verifying security protocols with Brutus
    Clarke, EM
    Jha, S
    Marrero, W
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) : 443 - 487
  • [28] Verifying layered security protocols
    Gibson-Robinson, Thomas
    Kamil, Allaa
    Lowe, Gavin
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (03) : 259 - 307
  • [29] Verifying the independence of security protocols
    Bela, Genge
    Ignat, Iosif
    ICCP 2007: IEEE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2007, : 155 - +
  • [30] An approach for verifying routing protocols in mobile ad hoc networks using Petri nets
    Xiong, CY
    Murata, T
    Leigh, J
    PROCEEDINGS OF THE IEEE 6TH CIRCUITS AND SYSTEMS SYMPOSIUM ON EMERGING TECHNOLOGIES: FRONTIERS OF MOBILE AND WIRELESS COMMUNICATION, VOLS 1 AND 2, 2004, : 537 - 540