Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks 2003
DOI: 10.1145/986858.986861
|View full text |Cite
|
Sign up to set email alerts
|

Modeling vulnerabilities of ad hoc routing protocols

Abstract: The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in which time is modeled by a set of constraints on the time of occurrence of events, enabling the representation of partially ordered timed events and asynchronous communication. Data variables are represented symbolically, capturing a range of distinct executions in each expression. Given a formal description of Ad Hoc On Demand Distance … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2004
2004
2016
2016

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(22 citation statements)
references
References 7 publications
0
22
0
Order By: Relevance
“…Since proving that a routing protocol is free from attacks is impossible by informal reasoning (as is the case for security protocol analysis in general, due to the virtually infinite protocol execution scenarios that should be considered), much effort has been recently devoted to modelling and analysing wireless communication and/or routing protocols in a formal way. For example, Yang and Baras [17] provide a symbolic model for routing protocols based on strand spaces, modelling the network topology but not the cryptographic primitives that can be used for securing communications; they also implement a semi-decision procedure to search for attacks. Buttyán and Vadja [18] provide a model for routing protocols in a cryptographic setting; they provide a security proof (by hand) for a fixed protocol.…”
Section: Conclusion Related and Future Workmentioning
confidence: 99%
“…Since proving that a routing protocol is free from attacks is impossible by informal reasoning (as is the case for security protocol analysis in general, due to the virtually infinite protocol execution scenarios that should be considered), much effort has been recently devoted to modelling and analysing wireless communication and/or routing protocols in a formal way. For example, Yang and Baras [17] provide a symbolic model for routing protocols based on strand spaces, modelling the network topology but not the cryptographic primitives that can be used for securing communications; they also implement a semi-decision procedure to search for attacks. Buttyán and Vadja [18] provide a model for routing protocols in a cryptographic setting; they provide a security proof (by hand) for a fixed protocol.…”
Section: Conclusion Related and Future Workmentioning
confidence: 99%
“…Recently, there has been a rising interest in formalizing analysis of security protocols in wireless networks. The problem of distance bounding has been treated formally in [15], whereas other works were concerned with routing [16,1,18,30] or local area networking [11]. These works are concerned with different problems and their approaches are not amenable to reason about secure neighbor discovery.…”
Section: Related Workmentioning
confidence: 99%
“…A different approach with similar goals to ours is presented in [28]. The authors of [28] propose a formal model for ad hoc routing protocols with the aim of representing insider attacks (which correspond to our notion of corrupted nodes).…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [28] propose a formal model for ad hoc routing protocols with the aim of representing insider attacks (which correspond to our notion of corrupted nodes). Their model is similar to the strand spaces model [10], which has been developed for the formal verification of key exchange protocols.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation