The hierarchical threat model of routing security for wireless ad hoc networks | |
Xian, Guo2; Tao, Feng1; Yuan, Zhan-Ting1; Ma, Jian-Feng3 | |
2010 | |
关键词 | Ad hoc networks Distributed computer systems Network routing Attacker models Communication capabilities Communication path Dolev-Yao threat model Provable security Routing security Security analysis Threat modeling |
DOI | 10.1109/ICNDC.2010.16 |
页码 | 36-40 |
英文摘要 | The hierarchical threat model is proposed to address the issues that the active-n-m attacker model can't reflect the real capability of the attacker and the Dolev-Yao threat model is not fit for the security analysis of ad hoc routing. In hierarchical treat model, we appropriately extend the communication capability of the active-n-m attacker, and abandon the assumption that the adversary controls all of the communication paths in Dolev-Yao threat model. In addition, the number of nodes controlled by the adversary and the knowledge owned by the adversary are considered as the two important parameters to evaluate the attack strength. Lastly, we analyze the security of endairA and ARAN. Both of them are provably secure routing for ad hoc networks in active-n-m attacker model. But it has been proven that both of them have security flaws in the hierarchical threat model. The minimum attacker capability corrupted endairA and ARAN is identified in hierarchical threat model. © 2010 IEEE. |
会议录 | Proceedings of the 1st International Conference on Networking and Distributed Computing, ICNDC 2010 |
会议录出版者 | IEEE Computer Society |
语种 | 英语 |
内容类型 | 会议论文 |
源URL | [http://ir.lut.edu.cn/handle/2XXMBERH/116885] |
专题 | 兰州理工大学 |
作者单位 | 1.School of Computer and Communication, Lanzhou University of Technology, LanZhou, China; 2.College of Electrical and Information Engineering, Lanzhou University of Technology, LanZhou, China; 3.School of Computer Science and Technology, Xidian University, Xi'an, China |
推荐引用方式 GB/T 7714 | Xian, Guo,Tao, Feng,Yuan, Zhan-Ting,et al. The hierarchical threat model of routing security for wireless ad hoc networks[C]. 见:. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论