Title :
The Hierarchical Threat Model of Routing Security for Wireless Ad Hoc Networks
Author :
Xian, Guo ; Tao, Feng ; Zhan-Ting, Yuan ; Jian-Feng, Ma
Author_Institution :
Coll. of Electr. & Inf. Eng., Lanzhou Univ. of Technol., Lanzhou, China
Abstract :
The hierarchical threat model is proposed to address the issues that the active-n-m attacker model can´t reflect the real capability of the attacker and the Dolev-Yao threat model is not fit for the security analysis of ad hoc routing. In hierarchical treat model, we appropriately extend the communication capability of the active-n-m attacker, and abandon the assumption that the adversary controls all of the communication paths in Dolev-Yao threat model. In addition, the number of nodes controlled by the adversary and the knowledge owned by the adversary are considered as the two important parameters to evaluate the attack strength. Lastly, we analyze the security of endairA and ARAN. Both of them are provably secure routing for ad hoc networks in active-n-m attacker model. But it has been proven that both of them have security flaws in the hierarchical threat model. The minimum attacker capability corrupted endairA and ARAN is identified in hierarchical threat model.
Keywords :
ad hoc networks; telecommunication network routing; telecommunication security; ARAN; Dolev-Yao threat model; active-n-m attacker model; adversary controls; attack strength; communication capability; endairA; hierarchical threat model; routing security; wireless ad hoc networks; Analytical models; Mobile ad hoc networks; Routing; Routing protocols; Security; Ad hoc networks; provable security; routing security; the active-n-m attacker model; the hierarchical threat model;
Conference_Titel :
Networking and Distributed Computing (ICNDC), 2010 First International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4244-8382-2
DOI :
10.1109/ICNDC.2010.16