Modeling and Verifying Ad Hoc Routing Protocols
Modeling and Verifying Ad Hoc Routing Protocols. Mathilde Arnaud, Véronique Cortier, and Stéphanie Delaune. Information and Computation, 238(0):30–67, Elsevier Science Publishers, 2014.
Download
Abstract
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such networks, a central issue, addressed by routing protocols, is to find a route from one device to another.
These protocols use cryptographic mechanisms in order to prevent malicious
nodes from compromising the discovered route.
Our contribution is twofold. We first propose a calculus for modeling and
reasoning about security protocols, including in particular secured
routing protocols. Our calculus extends standard symbolic models to take
into account the characteristics of routing protocols and to model wireless
communication in a more accurate way.
Our second main contribution is a decision procedure for analyzing
routing protocols for any network topology. By using constraint solving
techniques, we show that it is possible to automatically discover (in NPTIME)
whether there exists a network topology that would allow malicious nodes
to mount an attack against the protocol, for a bounded number of sessions.
We also provide a decision procedure for detecting attacks in case the
network topology is given a priori. We demonstrate
the usage and usefulness of our approach by analyzing
protocols of the literature, such as SRP applied to DSR and SDMSR.
BibTeX
@article{ACD-routing-IaC14, author = {Arnaud, Mathilde and Cortier, V{\'e}ronique and Delaune, St{\'e}phanie}, journal = {Information and Computation}, OPTmonth = {}, publisher = {Elsevier Science Publishers}, title = {Modeling and Verifying Ad Hoc Routing Protocols}, number = {0}, pages = {30-67}, volume = {238}, year = {2014}, abstract = {Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such networks, a central issue, addressed by routing protocols, is to find a route from one device to another. These protocols use cryptographic mechanisms in order to prevent malicious nodes from compromising the discovered route. \par Our contribution is twofold. We first propose a calculus for modeling and reasoning about security protocols, including in particular secured routing protocols. Our calculus extends standard symbolic models to take into account the characteristics of routing protocols and to model wireless communication in a more accurate way. Our second main contribution is a decision procedure for analyzing routing protocols for any network topology. By using constraint solving techniques, we show that it is possible to automatically discover (in NPTIME) whether there exists a network topology that would allow malicious nodes to mount an attack against the protocol, for a bounded number of sessions. We also provide a decision procedure for detecting attacks in case the network topology is given a priori. We demonstrate the usage and usefulness of our approach by analyzing protocols of the literature, such as SRP applied to DSR and SDMSR. }, doi = {10.1016/j.ic.2014.07.004}, }