Analysis of provably secure on-demand source routing in MANET
A formal model tailored to the security analysis of on-demand source routing protocols in MANET was analyzed, and the improper manipulations such as mergence of the adjacent adversarial nodes in the model and the flaw in the proof for endairA were indicated. A new hidden channel attack to endairA wa...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74651870/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537664764870656 |
---|---|
author | MAO Li-qiang1 MA Jian-feng1 LI Xing-hua1 |
author_facet | MAO Li-qiang1 MA Jian-feng1 LI Xing-hua1 |
author_sort | MAO Li-qiang1 |
collection | DOAJ |
description | A formal model tailored to the security analysis of on-demand source routing protocols in MANET was analyzed, and the improper manipulations such as mergence of the adjacent adversarial nodes in the model and the flaw in the proof for endairA were indicated. A new hidden channel attack to endairA was presented, which shows that endairA is not provably secure even in their model. |
format | Article |
id | doaj-art-ea6f364110e342dfa54c86978afad8f3 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2009-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-ea6f364110e342dfa54c86978afad8f32025-01-14T08:30:12ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130384474651870Analysis of provably secure on-demand source routing in MANETMAO Li-qiang1MA Jian-feng1LI Xing-hua1A formal model tailored to the security analysis of on-demand source routing protocols in MANET was analyzed, and the improper manipulations such as mergence of the adjacent adversarial nodes in the model and the flaw in the proof for endairA were indicated. A new hidden channel attack to endairA was presented, which shows that endairA is not provably secure even in their model.http://www.joconline.com.cn/zh/article/74651870/routing protocolprovable securityformal analysissimulation paradigmhidden channel attack |
spellingShingle | MAO Li-qiang1 MA Jian-feng1 LI Xing-hua1 Analysis of provably secure on-demand source routing in MANET Tongxin xuebao routing protocol provable security formal analysis simulation paradigm hidden channel attack |
title | Analysis of provably secure on-demand source routing in MANET |
title_full | Analysis of provably secure on-demand source routing in MANET |
title_fullStr | Analysis of provably secure on-demand source routing in MANET |
title_full_unstemmed | Analysis of provably secure on-demand source routing in MANET |
title_short | Analysis of provably secure on-demand source routing in MANET |
title_sort | analysis of provably secure on demand source routing in manet |
topic | routing protocol provable security formal analysis simulation paradigm hidden channel attack |
url | http://www.joconline.com.cn/zh/article/74651870/ |
work_keys_str_mv | AT maoliqiang1 analysisofprovablysecureondemandsourceroutinginmanet AT majianfeng1 analysisofprovablysecureondemandsourceroutinginmanet AT lixinghua1 analysisofprovablysecureondemandsourceroutinginmanet |