2010 8th IEEE International Conference on Software Engineering and Formal Methods 2010
DOI: 10.1109/sefm.2010.24
|View full text |Cite
|
Sign up to set email alerts
|

Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA

Abstract: Abstract-Several different secure routing protocols have been proposed for determining the appropriate paths on which data should be transmitted in ad hoc networks. In this paper, we focus on two of the most relevant such protocols, ARAN and endairA, and present the results of a formal analysis that we have carried out using the AVISPA Tool, an automated model checker for the analysis of security protocols. By model checking ARAN with the AVISPA Tool, we have discovered three attacks (a route disruption, a rou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 26 publications
0
12
0
Order By: Relevance
“…Several case studies have also been conducted. For example, D. Benetti et al [10] have analyzed the ARAN and endairA protocols with the AVISPA tool, considering a finite number of scenarios. G.Ács et al [3] have developed a framework for analyzing the distance vector routing protocols SAODV and ARAN.…”
Section: Introductionmentioning
confidence: 99%
“…Several case studies have also been conducted. For example, D. Benetti et al [10] have analyzed the ARAN and endairA protocols with the AVISPA tool, considering a finite number of scenarios. G.Ács et al [3] have developed a framework for analyzing the distance vector routing protocols SAODV and ARAN.…”
Section: Introductionmentioning
confidence: 99%
“…There have been attempts to develop formal methods to prove routing protocols secure . Model checking methods study the global state space of the protocol and develop tools to determine whether a sequence of sending or receiving message can lead to a successful attack by the attacker. If a protocol is insecure, model checking tools can discover counterexamples.…”
Section: Related Workmentioning
confidence: 99%
“…This can be split into the analysis of the integrity of network nodes on the one hand and the analysis of the integrity of process control units on the other. Techniques related to IP traceback [9,10,11,12,13,14] have been proposed to help solve this kind of problem in the context of denial of service attacks and such techniques are easily adaptable to this problem, particularly for probabilistic cases [15]. In [2], this requires demonstrating the existence of independent routes and then considering their consistency in terms of the model to determine route integrity.…”
Section: Related Workmentioning
confidence: 99%