A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network protocols

被引:0
|
作者
Li, Qin [1 ]
Zeng, Qingkai [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Dept Comp Sci & Technol, Nanjing, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a calculus of concurrent objects for specification and security analysis of Ad Hoc security protocols. The communicating nodes and the network are modeled by objects, while the interactions between them are modeled by asynchronous method invocations. The internal state of an object is represented by a constant method which can be overridden. The approach is complemented by a control flow analysis which can be used to automatically check properties such as security routing. The attacker model is integrated into the analysis as set values containing the knowledge of the attacker.
引用
收藏
页码:232 / 239
页数:8
相关论文
共 50 条
  • [31] Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues
    Jose, Mitha Rachel
    Singh, J. Amar Pratap
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (03) : 268 - 297
  • [32] Automating the security analysis process of secure ad hoc routing protocols
    Andel, T. R.
    Back, G.
    Yasinsac, A.
    SIMULATION MODELLING PRACTICE AND THEORY, 2011, 19 (09) : 2032 - 2049
  • [33] Inherent security of routing protocols in ad-hoc and sensor networks
    Roosta, Tanya
    Pai, Sameer
    Chen, Phoebus
    Sastry, Shankar
    Wicker, Stephen
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 1273 - +
  • [34] The Study on Ad hoc Networks Security Strategy based on Routing Protocols
    Ma Hongwei
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 445 - 449
  • [35] Strategies for enhancing routing security in protocols for mobile ad hoc networks
    Venkatraman, L
    Agrawal, DP
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2003, 63 (02) : 214 - 227
  • [36] A Propose to Enhance the AODV Routing Protocols' Security of Ad hoc Networks
    Li, Qing
    Wu, Wendan
    Jiang, Hanhong
    2008 IEEE INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING WORKSHOP PROCEEDINGS, VOLS 1 AND 2, 2008, : 30 - +
  • [37] Impact of Concurrent Communications in Geographical Broadcasting Protocols for Vehicular Ad hoc Networks
    Hafi, Houda
    Abdou, Wahabou
    Merniz, Salah
    2017 IEEE 9TH LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM), 2017,
  • [38] Vulnerabilities of ad hoc network routing protocols to MAC misbehavior
    Guang, L
    Assi, C
    WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 146 - 153
  • [39] Performance Analysis of Routing Protocols in Vehicular Ad Hoc Network
    Marzak, Bouchra
    Toumi, Hicham
    Benlahmar, Elhabib
    Talea, Mohamed
    ADVANCES IN UBIQUITOUS NETWORKING 2, 2017, 397 : 31 - 42
  • [40] Ad hoc Network Routing Protocols on Random Waypoint Model
    Kumar, Jogendra
    Panda, M. K.
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 901 - 905