期刊文献+

编码感知多跳无线网络安全路由协议 被引量:4

Coding-aware secure routing for multi-hop wireless networks
在线阅读 下载PDF
导出
摘要 分析了网络编码系统DCAR"编码+路由"发现过程存在的安全问题,提出了适用于编码感知安全路由协议的安全目标,设计了基于DCAR的编码感知安全路由协议DCASR,DCASR协议利用密码学机制保证可信路由建立和正确编码机会发现。为建模多跳无线网络特征和分析路由协议安全性,引入线程位置和线程位置相邻概念扩展安全系统逻辑LS2,提出了分析路由协议安全性的逻辑LS2-RP。LS2-RP用线程邻居集及邻居集的变化描述多跳无线网络的动态拓扑关系,用广播规则模型化多跳无线网络广播通信特征。最后,用LS2-RP协议编程语言描述了DCASR协议,用LS2-RP的谓词公式和模态公式描述DCASR协议的安全属性,用LS2-RP逻辑证明系统分析了DCASR协议的安全性,证明DCASR协议能够满足安全目标。 To address security issues of DCAR in "coding+routing" discovery,a new security destination was proposed and a distributed coding-aware secure routing(DCASR) was designed.DCASR guarantees discovery of correct coding opportunity and establishment of trusted routes by using cryptography.To analyze the properties of DCASR,LS2(logic of security systems) was extended,and a new logic LS2-RP(LS2 for routing protocol) was proposed.In LS2-RP,the concepts of location and neighboring location of thread were introduced.The dynamic topology of multi-hop wireless networks was described by the set of neighbors for thread.The broadcast rule of neighboring location threads modeled the feature of wireless broadcast communication.Finally,DCASR was described by programming language of LS2-RP and security properties were defined by predicates and modal formulas of LS2-RP.Security of DCASR was analyzed by using the proof system of LS2-RP.DCASR can satisfy our secure destination.
出处 《通信学报》 EI CSCD 北大核心 2012年第6期133-142,共10页 Journal on Communications
基金 国家自然科学基金资助项目(60972078) 甘肃省高等学校基本科研业务费基金资助项目(0914ZTB186) 兰州理工大学博士基金资助项目(BS14200901) 甘肃省自然科学基金资助项目(1014RJZA005)~~
关键词 多跳无线网络 安全路由协议 DCAR 形式化方法 LS2逻辑 multi-hop wireless network secure routing DCAR formal method LS2
  • 相关文献

参考文献14

  • 1KATTI S, RAHUL H, HU W. XORs in the air: practical wireless network coding[J]. IEEE/ACM Transactions on Networking, 2008, 16(3):497-510.
  • 2LE J L, JOHN LUI C S, CHIU D M. DCAR: dsitributed coding-aware routing in wireless networks[J]. IEEE Transactions on Mobile Com- puting, 2010, 9(4): 596-608.
  • 3KANNHAVONG B, NAKAYAMA H, NEMOTO Y. A survey of routing attacks in mobile ad hoc networks[J]. Wireless Communication, 2007, 14(5): 85-91.
  • 4DONG J, REZA C, CRISTINA N R. Secure network coding for wire- less mesh networks: threats, challenges, and directions[J]. Computer Communications, 2009, 32(17):1790-1801.
  • 5PAPADIMITRATOS P, HAAS Z. Secure routing for mobile ad hoc networks[A]. The Communication Networks and Distributed System Modeling and Simulation Conference [C]. San Antonio, 2002. 27-31.
  • 6HU Y C, PERRIG A, JOHNSON D B. Ariadne: a secure on-demand routing protocol for ad hoc networks [J]. Wireless Networks, 2005, 11(1-2):21-38.
  • 7ACS G. BUTTYAN L, VAJDA I. Provably secure on-demand source routing in mobile ad hoc networks[J]. IEEE Transactions on Mobile Computing, 2006, 5(11):1533-1546.
  • 8冯涛,郭显,马建峰,李兴华.可证明安全的节点不相交多路径源路由协议[J].软件学报,2010,21(7):1717-1731. 被引量:9
  • 9韩继红,郭渊博,王亚弟.安全协议形式化分析方法[J].信息工程大学学报,2008,9(3):272-276. 被引量:6
  • 10DATTA A, JASON E DEEPAK G A logic of secure systems and its application to trusted computing [A]. 2009 30th IEEE Symposium on Security and Privacy [C]. Washington, DC, USA, 2009. 221-236.

二级参考文献18

  • 1季晓君,田畅,张毓森.MANET路由协议安全分析[J].应用科学学报,2007,25(1):30-34. 被引量:4
  • 2Roy A, Datta A, Derek A, et al. Secrecy Analysis in Protocol Composition Logic, in Formal Logical Methods for System Security and Correctness [ M ]. IOS Press, 2008.
  • 3Abadi M, Blanchet B. Analyzing Security Protocols with Secrecy Types and Logic Programs [ C]//29th ACM SIGPLAN-SIGACT Syposium on Principles of Programming Languages. Portland, Oregon, 2002:33 - 44.
  • 4Cohen E. First-order verification of cryptographic protocols [ J]. Journal of Computer Security, 2003, 11 (2) :189 -216.
  • 5Bozzano M, Delzanno G. Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols. Journal of Symbolic Computation[ J]. 2004,38(5) :1375 - 1415.
  • 6Durgin N, Mitchell J C , Pavlovic D. A compositional logic for proving security properties of protocols [ J]. Journal of Computer Security,2003,11 (4) :677 - 721.
  • 7Lowe G, Auty M. On a calculus for security protocol development[R]. Technical report, Oxford University, 2005.
  • 8Basin D, Modersheim S, Vigano L. OFMC: A Symbolic Model-Checker for Security Protocols [ J]. International Journal of Information Security, 2005,4(3 ) : 181 - 208.
  • 9Alessandro Armando, Luca Compagna. SAT-based model-checking for security protocols analysis [ J]. International Journal of Information Security, 2008,7 ( 1 ) : 3 -32.
  • 10Turuani M,Rusinowitch M. Protocol insecurity with finite number of sessions is NP-complete [ C ]//14th Computer Security Foundations Workshop. IEEE, 2001:174 - 187.

共引文献12

同被引文献28

  • 1李之棠,武洋.一种基于无线网络的动态加密方法[J].大连理工大学学报,2005,45(z1):180-184. 被引量:4
  • 2GEORGE X,CHRISTOPHER N, VERVERIDIS V A Stef al. A sur-vey of information-centric networking research[J]. CommunicationsSurveys and Tutorials, 2014, 16(2):1024-1049.
  • 3AHLGREN B, DANNEWITZ C, IMBRENDA C. A survey of infor-mation-centric networking[J]. IEEE Communications Magazine, 2012,50(7): 26-36.
  • 4ZHANG L X, KCCLAFFY,PATRICK C. Named data networking[J].ACM SIGCOMM Computer Communicaticni Review, 2014,44(3): 66-73.
  • 5VAN J, DIANA K, SMETTERS J D, et al. Networking named con-tent[A]. Communications of the ACM, Proceeding of the 5th Interna-tional Conference on Emerging Networking Experiments and tech-nologies[C]. 2009.1-12.
  • 6MARICA A, CLAUDIA C, ANTONELLA N. Forwarding strategies innamed data wireless ad hoc networks: design and evaluation[J]. Jour-nal of Network and Computer Applications, 2015, 50: 148-158.
  • 7MEISEL M, PAPPAS V,ZHANG L X. Ad hoc networking via nameddata[A]. Proc of the 5th ACM International Workshop on Mobility inthe Evolving Internet Architecture[C]. New York, NY, USA, 2010.3-8.
  • 8QIN D Y, LI H W, MA L,et al. An ant colony algorithm based conges-tion elusion routing strategy for mobile ad hoc networks[J]. Journal ofHarbin Institute of Technology(New Seriers), 2013,20(3):99-103.
  • 9BY G T, NISHANTH S, RUBEN C,et al. A survey of mobility ininformation-centric networks[J]. Communications of the ACM, 2013,56(12):90-98.
  • 10ABDALLAH E Q HASSANEIN H S, ZULKERNINE M. A survey ofsecurity attacks in information-centric networking[J]. IEEE Commu-nications Surveys & Tutorials, 2015,17(3): 1441-1454.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部