Formal security analysis of a secure on-demand routing protocol for AD HOC networks using model checking

dc.contributorGraduate Program in Computer Engineering.
dc.contributor.advisorÇağlayan, M. Ufuk.
dc.contributor.authorÖnem, Evren.
dc.date.accessioned2023-03-16T10:06:28Z
dc.date.available2023-03-16T10:06:28Z
dc.date.issued2007.
dc.description.abstractAn ad hoc network is a self-configuring network of mobile terminals, connected by wireless links and exhibiting nomadic behavior by freely moving within an area. Computing the routes between the terminals in the ad hoc environment and delivering a guarantee of communication have never been achieved by any protocol in its entirety. In this work, we model an ad hoc network to model-check ARIADNE in order to verify one of its powerful security properties. By a similar approach to Buttyμan’s Active-1-2 attack on ARIADNE, we have used SPIN to flag a sequence of possible events in the protocol leading to a new Active-2-2 attack, where two compromised nodes collaborate to remove all intermediate nodes from the route-discovery process.
dc.format.extent30cm.
dc.format.pagesxiii, 79 leaves;
dc.identifier.otherCMPE 2007 O54
dc.identifier.urihttps://digitalarchive.library.bogazici.edu.tr/handle/123456789/12511
dc.publisherThesis (M.S.)-Bogazici University. Institute for Graduate Studies in Science and Engineering, 2007.
dc.relationIncludes appendices.
dc.relationIncludes appendices.
dc.subject.lcshWireless communication systems.
dc.subject.lcshRouters (Computer networks)
dc.subject.lcshComputer network protocols.
dc.titleFormal security analysis of a secure on-demand routing protocol for AD HOC networks using model checking

Files

Original bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
b1459649.001983.001.PDF
Size:
1.39 MB
Format:
Adobe Portable Document Format
No Thumbnail Available
Name:
b1459649.001984.001.zip
Size:
355.32 KB
Format:
ZIP archive
Description:

Collections