A new method to deduce counterexamples in secure routing protocols based on strand space model

Strand space model, an excellent formal analysis method, is still not effective enough when it is used to analyze ad hoc routing protocols. Counterexamples cannot be deduced directly if a protocol is proved insecure by strand space model. Based on backward reasoning and strand space model, an attack...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2016-12, Vol.9 (18), p.5834-5848
Hauptverfasser: Dong, Xuewen, Yang, Chao, Sheng, Lijie, Wang, Chao, Ma, Jianfeng
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Strand space model, an excellent formal analysis method, is still not effective enough when it is used to analyze ad hoc routing protocols. Counterexamples cannot be deduced directly if a protocol is proved insecure by strand space model. Based on backward reasoning and strand space model, an attack analysis method is proposed to find all possible attacks that cause nonexistent routes to be accepted. To begin with, a nonexistent route is assumed to be accepted by a routing protocol. Then, to decrease the complexity of analysis, an adversarial node ion process is carried out to make all the intermediate nodes in the nonexistent route turn into normal nodes. Furthermore, a combined analysis of strand space model and cross‐route attack is carried on the route reply phase of the routing protocol. Finally, all possible attacks that lead to the nonexistent route can be deduced after combined analyzing of the route request phase. Then, we take endairA—a classic secure routing protocol in ad hoc networks—as an example to verify the correctness and effectiveness of the new method. Copyright © 2017 John Wiley & Sons, Ltd. On the basis of backward reasoning and strand space model, an attack analysis method is proposed to find all possible attacks that cause nonexistent routes to be accepted. We assume a nonexistent route is accepted by a routing protocol and carry out an adversarial node ion process to decrease the complexity. Then, a combination analysis of strand space model and cross‐route attack is carried on to deduce all the possible attacks, and the correctness of the attack analysis method is verified.
ISSN:1939-0114
1939-0122
DOI:10.1002/sec.1739