会议专题

The Hierarchical Threat Model of Routing Security for wireless Ad hoc Networks

The hierarchical threat model is proposed to address the issues that the active-n-m attacker model cant reflect the real capability of the attacker and the Dolev-Yao threat model is not fit for the security analysis of ad hoc routing. In hierarchical treat model, we appropriately extend the communication capability of the active-n-m attacker, and abandon the assumption that the adversary controls all of the communication paths in Dolev-Yao threat model. In addition, the number of nodes controlled by the adversary and the knowledge owned by the adversary are considered as the two important parameters to evaluate the attack strength. Lastly, we analyze the security of endairA and ARAN. Both of them are provably secure routing for ad hoc networks in aciven-m attacker model. But it has been proven that both of them have security flaws in the hierarchical threat model. The minimum attacker capability corrupted endairA and ARAN is identified in hierarchical threat model.

Ad hoc networks routing security the active-n-m attacker model the hierarchical threat model provable security

Guo Xian Feng Tao Yuan Zhan-Ting Ma Jian-Feng

College of Electrical and Information Engineering, Lanzhou University of Technology, GanSu LianHe Un School of Computer and Communication, Lanzhou University of Technology, LanZhou, China School of Computer and Communication, Lanzhou University ofTechnology, LanZhou,China School of Computer Science & Technology,Xidian University, Xian, China

国际会议

The First International Conference on Networking and Distributed Computing(第一届网络与分布式计算国际会议 ICNDC 2010)

杭州

英文

36-40

2010-10-21(万方平台首次上网日期,不代表论文的发表时间)