Analysis of provably secure on-demand source routing in MANET

A formal model tailored to the security analysis of on-demand source routing protocols in MANET was analyzed, and the improper manipulations such as mergence of the adjacent adversarial nodes in the model and the flaw in the proof for endairA were indicated. A new hidden channel attack to endairA wa...

Full description

Saved in:
Bibliographic Details
Main Authors: MAO Li-qiang1, MA Jian-feng1, LI Xing-hua1
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74651870/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537664764870656
author MAO Li-qiang1
MA Jian-feng1
LI Xing-hua1
author_facet MAO Li-qiang1
MA Jian-feng1
LI Xing-hua1
author_sort MAO Li-qiang1
collection DOAJ
description A formal model tailored to the security analysis of on-demand source routing protocols in MANET was analyzed, and the improper manipulations such as mergence of the adjacent adversarial nodes in the model and the flaw in the proof for endairA were indicated. A new hidden channel attack to endairA was presented, which shows that endairA is not provably secure even in their model.
format Article
id doaj-art-ea6f364110e342dfa54c86978afad8f3
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-ea6f364110e342dfa54c86978afad8f32025-01-14T08:30:12ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130384474651870Analysis of provably secure on-demand source routing in MANETMAO Li-qiang1MA Jian-feng1LI Xing-hua1A formal model tailored to the security analysis of on-demand source routing protocols in MANET was analyzed, and the improper manipulations such as mergence of the adjacent adversarial nodes in the model and the flaw in the proof for endairA were indicated. A new hidden channel attack to endairA was presented, which shows that endairA is not provably secure even in their model.http://www.joconline.com.cn/zh/article/74651870/routing protocolprovable securityformal analysissimulation paradigmhidden channel attack
spellingShingle MAO Li-qiang1
MA Jian-feng1
LI Xing-hua1
Analysis of provably secure on-demand source routing in MANET
Tongxin xuebao
routing protocol
provable security
formal analysis
simulation paradigm
hidden channel attack
title Analysis of provably secure on-demand source routing in MANET
title_full Analysis of provably secure on-demand source routing in MANET
title_fullStr Analysis of provably secure on-demand source routing in MANET
title_full_unstemmed Analysis of provably secure on-demand source routing in MANET
title_short Analysis of provably secure on-demand source routing in MANET
title_sort analysis of provably secure on demand source routing in manet
topic routing protocol
provable security
formal analysis
simulation paradigm
hidden channel attack
url http://www.joconline.com.cn/zh/article/74651870/
work_keys_str_mv AT maoliqiang1 analysisofprovablysecureondemandsourceroutinginmanet
AT majianfeng1 analysisofprovablysecureondemandsourceroutinginmanet
AT lixinghua1 analysisofprovablysecureondemandsourceroutinginmanet