{"title":"自组织网络安全路由协议的形式化分析","authors":"Qiuna Niu","doi":"10.1109/WCSP.2009.5371659","DOIUrl":null,"url":null,"abstract":"In mobile ad hoc networks, routing security has become an important issue. Due to limited bandwidth and batteries energy of ad hoc networks, routing protocols of ad hoc must be secure, effective and less redundancy. This makes it possible for analyzing the security performance of routing protocols via formal analysis. In this paper, we describe the formalization of routing protocols by using BAN logic, and present the formal method in detail. Further, taking example of Authenticated Routing for Ad hoc Networks (ARAN), we analyze the security of routing protocol precisely using the formal method, which proves the method is valid.","PeriodicalId":244652,"journal":{"name":"2009 International Conference on Wireless Communications & Signal Processing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Formal analysis of secure routing protocol for ad hoc networks\",\"authors\":\"Qiuna Niu\",\"doi\":\"10.1109/WCSP.2009.5371659\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In mobile ad hoc networks, routing security has become an important issue. Due to limited bandwidth and batteries energy of ad hoc networks, routing protocols of ad hoc must be secure, effective and less redundancy. This makes it possible for analyzing the security performance of routing protocols via formal analysis. In this paper, we describe the formalization of routing protocols by using BAN logic, and present the formal method in detail. Further, taking example of Authenticated Routing for Ad hoc Networks (ARAN), we analyze the security of routing protocol precisely using the formal method, which proves the method is valid.\",\"PeriodicalId\":244652,\"journal\":{\"name\":\"2009 International Conference on Wireless Communications & Signal Processing\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Wireless Communications & Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WCSP.2009.5371659\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Wireless Communications & Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSP.2009.5371659","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Formal analysis of secure routing protocol for ad hoc networks
In mobile ad hoc networks, routing security has become an important issue. Due to limited bandwidth and batteries energy of ad hoc networks, routing protocols of ad hoc must be secure, effective and less redundancy. This makes it possible for analyzing the security performance of routing protocols via formal analysis. In this paper, we describe the formalization of routing protocols by using BAN logic, and present the formal method in detail. Further, taking example of Authenticated Routing for Ad hoc Networks (ARAN), we analyze the security of routing protocol precisely using the formal method, which proves the method is valid.