TY - GEN
T1 - Modeling and verifying the ariadne protocol using CSP
AU - Wu, Xi
AU - Liu, Si
AU - Zhu, Huibiao
AU - Zhao, Yongxin
AU - Chen, Lei
PY - 2012
Y1 - 2012
N2 - Mobile Ad Hoc Networks (MANETs) are formed dynamically by mobile nodes without the support of prior stationary infrastructures. In such networks, routing protocols, particularly secure ones are always an essential part. Ariadne, an efficient and well-known on-demand secure protocol of MANETs, mainly concerns about how to prevent a malicious node from compromising the route. In this paper, we apply the method of process algebra Communicating Sequential Processes (CSP) to model and reason about the Ariadne protocol, focusing on the process of its route discovery. In our framework, we consider the communication entities as processes, including the initiator, the intermediate nodes and the target. Moreover, we use PAT, a model checker for CSP, to verify whether the model caters for the specification and the non-trivial secure properties, e.g. existence of fake path. Our verification result naturally demonstrates that the fake routing attacks may be present in the Ariadne protocol.
AB - Mobile Ad Hoc Networks (MANETs) are formed dynamically by mobile nodes without the support of prior stationary infrastructures. In such networks, routing protocols, particularly secure ones are always an essential part. Ariadne, an efficient and well-known on-demand secure protocol of MANETs, mainly concerns about how to prevent a malicious node from compromising the route. In this paper, we apply the method of process algebra Communicating Sequential Processes (CSP) to model and reason about the Ariadne protocol, focusing on the process of its route discovery. In our framework, we consider the communication entities as processes, including the initiator, the intermediate nodes and the target. Moreover, we use PAT, a model checker for CSP, to verify whether the model caters for the specification and the non-trivial secure properties, e.g. existence of fake path. Our verification result naturally demonstrates that the fake routing attacks may be present in the Ariadne protocol.
KW - Ariadne
KW - CSP
KW - Formal Verification
KW - Mobile Ad hoc Networks
UR - https://www.scopus.com/pages/publications/84862066770
U2 - 10.1109/ECBS.2012.31
DO - 10.1109/ECBS.2012.31
M3 - 会议稿件
AN - SCOPUS:84862066770
SN - 9780769546643
T3 - Proceedings - 2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, ECBS 2012
SP - 24
EP - 32
BT - Proceedings - 2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, ECBS 2012
T2 - 2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, ECBS 2012
Y2 - 11 April 2012 through 13 April 2012
ER -