Formal Security Analysis for Ad-Hoc Networks

被引:7
|
作者
Nanz, Sebastian [1 ]
Hankin, Chris [1 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Dept Comp, London, England
关键词
Protocol analysis; language-based security; ad-hoc networks;
D O I
10.1016/j.entcs.2004.10.029
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can perform a variety of attacks just by not behaving according to the specification. Whilst secure versions of routing protocols are under development, little effort has been made to formalise the scenario similarly to developments in the realm of traditional security protocols for secrecy and authentication. We present a broadcast process calculus suitable to describe the behaviour of protocols which require a local memory component for every node. By adding annotations for the origin of messages, we are able to formalise a vital security property in this context, called store authorisation. Furthermore, we describe a static analysis for the detection of violations of this property. For a model of the AODV protocol in our calculus, we are then able to deduce that an attacker may introduce a routing loop in certain networks.
引用
收藏
页码:195 / 213
页数:19
相关论文
共 50 条
  • [1] Security in wireless ad-hoc networks - A survey
    Di Pietro, R.
    Guarino, S.
    Verde, N. V.
    Domingo-Ferrer, J.
    COMPUTER COMMUNICATIONS, 2014, 51 : 1 - 20
  • [2] Security Technologies in Ad-hoc Networks: A Survey
    Zhong, Yaohui
    Guo, Yongan
    PROCEEDINGS OF THE 2021 IEEE 7TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2021): ACCELERATING NETWORK SOFTWARIZATION IN THE COGNITIVE AGE, 2021, : 423 - 429
  • [3] Cooperative Security Schemes for Mobile Ad-Hoc Networks
    Caballero-Gil, P.
    Hernandez-Goya, C.
    COOPERATIVE DESIGN, VISUALIZATION, AND ENGINEERING, PROCEEDINGS, 2008, 5220 : 286 - 294
  • [4] An overlay approach to data security in ad-hoc networks
    Liebeherr, Joerg
    Dong, Guangyu
    AD HOC NETWORKS, 2007, 5 (07) : 1055 - 1072
  • [5] A biometric authentication approach for high security ad-hoc networks
    Xiao, QH
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 250 - 256
  • [6] AODVsec: A Multipath Routing Protocol in Ad-Hoc Networks for Improving Security
    Wang, Cuirong
    Cai, Shuxin
    Li, Rui
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 401 - +
  • [7] Security-Aware Topology Control for Wireless Ad-hoc Networks
    Galiotos, Panagiotis
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [8] Ad-Hoc Networks at Global Scale
    Cruz, Rene L.
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
  • [9] Capacitated reliability for Ad-hoc networks
    Cook, Jason L.
    Ramirez-Marquez, Jose Emmanuel
    ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, 2007 PROCEEDINGS, 2006, : 192 - +
  • [10] Secret instantiation in ad-hoc networks
    Kulkarni, SS
    Gouda, MG
    Arora, A
    COMPUTER COMMUNICATIONS, 2006, 29 (02) : 200 - 215