期刊文献+

MANET路由协议安全分析 被引量:4

Security Analysis of MANET Routing Protocol
下载PDF
导出
摘要 分别采用strand space和BAN逻辑,分析MANET安全路由协议的plausible route属性.分析结果表明MANET路由协议的安全性本质上是建立在网络中可信节点之间实体认证和消息完整性认证机制的基础上;传统的安全协议形式化分析工具适用于MANET安全路由协议的分析. Secure routing protocol design and analysis is the core of the security problems in mobile ad hoc network. This paper uses strand space and BAN logic to prove plausible route property of secure mobile ad hoc network routing protocol. Our analysis indicates that security of mobile ad hoc network routing protocol is essentially based on agent authentication and message integrity between trusted nodes in the network, therefore traditional formal methods can also be used to analyze secure mobile ad hoc network routing protocols.
出处 《应用科学学报》 CAS CSCD 北大核心 2007年第1期30-34,共5页 Journal of Applied Sciences
关键词 移动AD hoe网络 安全路由协议 形式化分析 串空间 MANET secure routing protocol formal analysis strand space
  • 相关文献

参考文献14

  • 1PAPADIMITRATOS P,HAAS Z J.Secure Link State Routing for Mobile Ad Hoc Networks[EB/OL].http://people.ece.cornell.edu/haas/wnl/Publications/saahn03.pdf,2005-10-20.
  • 2HU Yih-Chun,JOHNSON D B,PERRIG A.SEAD:secure efficient distance vector routing for mobile wireless ad hoc networks[J].Ad Hoc Networks,2003,1(1):175-192.
  • 3HU Y C,PERRIG A,JOHNSON D.Ariadne:a secure ondemand routing protocol for ad hoc networks[C]//Westin Peachtree Plaza:Mobicom2002,2002:12-23.
  • 4Draft-guerrero-manet-saodv-02.txt[EB/OL],http://ietfreport.isoc.org/idref/draft-guerrero-manet-saodv/,2005-10-20.
  • 5BUTTYAN L,VAJDA I.Towards Provable Security for Ad Hoc Routing Protocols[EB/OL].http://citeseer.ist.psu.edu/698331.html,2005-10-20.
  • 6MARSHALL J.An analysis of the secure routing protocol for mobile ad hoc network route discovery:using intuitive reasoning and formal verification to identify flaws[D].Florida:Florida State University,2003.
  • 7GERGELYACS,BUTTYAN L,VAJDA I.Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks[EB/OL].http://eprint.iacr.org/2004/159.pdf,2005-10-20.
  • 8THAYER F J,HERZOG J C,GUTTMAN J D.Strand spaces:why is a security protocol correct[C]//Los Alamitos:IEEE Computer Society Press,1998:160-171.
  • 9THAYER F J,HERZOG J C,GUTTMAN J D.Strand spaces:proving security protocols correct[J].Journal of Computer Security,1999,7(2-3):191-230.
  • 10BURROWS M,ABADI M,NEEDHAM R.A logic of authentication[J].ACM Transactions in Computer Systems,1990,8(1):18-36.

同被引文献20

  • 1王梅,吴蒙.MANET中常见的路由安全威胁及相应解决方案[J].通信学报,2005,26(5):106-112. 被引量:9
  • 2李喆,刘军.卫星网络安全路由研究[J].通信学报,2006,27(8):113-118. 被引量:21
  • 3KARAPANTAZIS S, PAPAPETROU E, PAVLIDOU F N. On-de- mand routing in LEO satellite systems[ J]. Computer Networks, 2007, 51 (15) : 4356 -4376.
  • 4AWERBUCH B, HOLMER D, NITAROTARU C. An on-demand secure routing protocol resilient to byzantine failures[ C]//Proceed- ings of the 1st ACM Workshop on Wireless Security. New York: ACM, 2002:21 - 30.
  • 5GERGELY A C S, LLEVENTE B, ISTVAN V. Provably secure on- demand source routing in mobile Ad Hoc networks[J]. IEEE Trans- actions on Mobile Computin, 2006, 5(11) : 1533 - 1546.
  • 6KARAPANTAZIS S, PAPAPETROU E, PAVLIDOU F N. On-de- mand muting in LEO satellite systems[ J]. Computer Networks, 2007, 51 (15) : 4356 -4376.
  • 7AWERBUCH B, HOLMER D, NITAROTARU C. An on-demand secure routing protocol resilient to byzantine failures[ C]//Proceed- ings of the 1st ACM Workshop on Wireless Security. New York: ACM, 2002:21 - 30.
  • 8GERGELY A C S, LLEVENTE B, ISTVAN V. Provably secure on- demand source routing in mobile Ad Hoc networks[ J]. IEEE Trans- actions on Mobile Computin, 2006, 5(11) : 1533 - 1546.
  • 9Acs G, Buttytn L, IstvSn V. Provably Secure On-demand Source in Mobile Ad Hoc Networks [ J ]. IEEE Transactions on Mobile Computing,2006,5( 11 ) : 1533-1546.
  • 10Yang Shahan, Baras J S. Modeling Vulnerabilities of Ad Hoc Routing Protocols[ C]//Proc of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. Fairfax Virginia: [ s. n. ] ,2003 : 12-20.

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部