The Hierarchical Threat Model of Routing Security for wireless Ad hoc Networks
The hierarchical threat model is proposed to address the issues that the active-n-m attacker model cant reflect the real capability of the attacker and the Dolev-Yao threat model is not fit for the security analysis of ad hoc routing. In hierarchical treat model, we appropriately extend the communication capability of the active-n-m attacker, and abandon the assumption that the adversary controls all of the communication paths in Dolev-Yao threat model. In addition, the number of nodes controlled by the adversary and the knowledge owned by the adversary are considered as the two important parameters to evaluate the attack strength. Lastly, we analyze the security of endairA and ARAN. Both of them are provably secure routing for ad hoc networks in aciven-m attacker model. But it has been proven that both of them have security flaws in the hierarchical threat model. The minimum attacker capability corrupted endairA and ARAN is identified in hierarchical threat model.
Ad hoc networks routing security the active-n-m attacker model the hierarchical threat model provable security
Guo Xian Feng Tao Yuan Zhan-Ting Ma Jian-Feng
College of Electrical and Information Engineering, Lanzhou University of Technology, GanSu LianHe Un School of Computer and Communication, Lanzhou University of Technology, LanZhou, China School of Computer and Communication, Lanzhou University ofTechnology, LanZhou,China School of Computer Science & Technology,Xidian University, Xian, China
国际会议
杭州
英文
36-40
2010-10-21(万方平台首次上网日期,不代表论文的发表时间)