A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network protocols

被引:0
|
作者
Li, Qin [1 ]
Zeng, Qingkai [1 ]
机构
[1] Nanjing Univ, State Key Lab Novel Software Technol, Dept Comp Sci & Technol, Nanjing, Peoples R China
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present a calculus of concurrent objects for specification and security analysis of Ad Hoc security protocols. The communicating nodes and the network are modeled by objects, while the interactions between them are modeled by asynchronous method invocations. The internal state of an object is represented by a constant method which can be overridden. The approach is complemented by a control flow analysis which can be used to automatically check properties such as security routing. The attacker model is integrated into the analysis as set values containing the knowledge of the attacker.
引用
收藏
页码:232 / 239
页数:8
相关论文
共 50 条
  • [41] How to obfuscate execution of protocols in an ad hoc radio network?
    Kardas, Marcin
    Klonowski, Marek
    Syga, Piotr
    AD HOC NETWORKS, 2019, 84 : 90 - 106
  • [42] Performance comparison of ad hoc wireless network routing protocols
    Ehsan, H
    Uzmi, ZA
    INMIC 2004: 8TH INTERNATIONAL MULTITOPIC CONFERENCE, PROCEEDINGS, 2004, : 457 - 465
  • [43] Performance Comparison of Reactive Routing Protocols for Ad Hoc Network
    Abushiba, Walid
    Johnson, Princy
    2015 FORTH INTERNATIONAL CONFERENCE ON E-TECHNOLOGIES AND NETWORKS FOR DEVELOPMENT, 2015, : 1 - 5
  • [44] Advances on Network Protocols and Algorithms for Vehicular Ad Hoc Networks
    Lloret, Jaime
    Ghafoor, Kayhan Z.
    Rawat, Danda B.
    Xia, Feng
    MOBILE NETWORKS & APPLICATIONS, 2013, 18 (06): : 749 - 754
  • [45] Advances on Network Protocols and Algorithms for Vehicular Ad Hoc Networks
    Jaime Lloret
    Kayhan Z. Ghafoor
    Danda B. Rawat
    Feng Xia
    Mobile Networks and Applications, 2013, 18 : 749 - 754
  • [46] Analysis of Routing Protocols in Vehicular Ad Hoc Network Applications
    Asgari, Mojtaba
    Jumari, Kasmiran
    Ismail, Mahamod
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 3, 2011, 181 : 384 - 397
  • [47] Fairness of Trust Based Mobile ad hoc Network Protocols
    Burke, Ivan Daniel
    Olivier, Martin
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 67 - 81
  • [48] Routing protocols in wireless mobile ad hoc network - A review
    Latiff, LA
    Fisal, N
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 600 - 604
  • [49] A basic calculus for verifying properties of interacting objects
    Conrad, S
    DATA & KNOWLEDGE ENGINEERING, 1996, 18 (02) : 119 - 145
  • [50] Parameterized Verification of Safety Properties in Ad Hoc Network Protocols
    Delzanno, Giorgio
    Sangnier, Arnaud
    Zavattaro, Gianluigi
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2011, (60): : 56 - 65