Modeling and verifying the ariadne protocol using CSP

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Mobile Ad Hoc Networks (MANETs) are formed dynamically by mobile nodes without the support of prior stationary infrastructures. In such networks, routing protocols, particularly secure ones are always an essential part. Ariadne, an efficient and well-known on-demand secure protocol of MANETs, mainly concerns about how to prevent a malicious node from compromising the route. In this paper, we apply the method of process algebra Communicating Sequential Processes (CSP) to model and reason about the Ariadne protocol, focusing on the process of its route discovery. In our framework, we consider the communication entities as processes, including the initiator, the intermediate nodes and the target. Moreover, we use PAT, a model checker for CSP, to verify whether the model caters for the specification and the non-trivial secure properties, e.g. existence of fake path. Our verification result naturally demonstrates that the fake routing attacks may be present in the Ariadne protocol.

Original languageEnglish
Title of host publicationProceedings - 2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, ECBS 2012
Pages24-32
Number of pages9
DOIs
StatePublished - 2012
Event2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, ECBS 2012 - Novi Sad, Serbia
Duration: 11 Apr 201213 Apr 2012

Publication series

NameProceedings - 2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, ECBS 2012

Conference

Conference2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, ECBS 2012
Country/TerritorySerbia
CityNovi Sad
Period11/04/1213/04/12

Keywords

  • Ariadne
  • CSP
  • Formal Verification
  • Mobile Ad hoc Networks

Fingerprint

Dive into the research topics of 'Modeling and verifying the ariadne protocol using CSP'. Together they form a unique fingerprint.

Cite this