ISSN 1000-9825, CODEN RUXUEW E-mail jos@iscasaccn Journal of Software, Vol17, Supplement, November 2006, pp256 261 http//wwwjosorgcn 2006 by of Journal of Software All rights reserved Tel/Fax +86-10-62562563 Ad Hoc +, (, 250014) Security Analysis for Ad Hoc Routing Protocols Based on Improved Strand Space WANG Ji-Zhi +, WANG Ying-Long (Shandong Computer Science Center, Ji nan 250014, China) + Corresponding author Phn +86-531-82605266, Fax +86-531-82962004, E-mail wangjzh@keylabnet Wang JZ, Wang YL Security analysis for ad hoc routing protocols based on improved strand space Journal of Software, 2006,17(Suppl)256 261 http//wwwjosorgcn/1000-9825/17/s256htm Abstract Based on the characteristics of Ad Hoc mobile network, the paper redefines the consistency conditions for the normal operation of the protocol and at the same time adds intermediator credibility condition, thus adapts the strand space method to the security analysis for Ad Hoc routing protocols The SRP protocol is taken as an example for the analysis of its security and the valuable results have been obtained Key words strand space secure protocol consistency condition intermediator credibility condition Ad Hoc,, Ad Hoc SRP,, Ad Hoc,, 1) 2), 3),, 4),,,,,, 1),, Supported by the Natural Science Foundation of Shandong Province of China under Grant NoQ2005G02 ( ) Received 2006-03-30 Accepted 2006-10-08
Ad Hoc 257 2), 3),,,,, 4),,,, Ad Hoc,, Ad Hoc, Ad Hoc, Ad Hoc [1] 1 (Σ,tr), Σ,,tr Σ A( ) A, A t 0 t 1 t 0 t 1 1 σ,α, α A,σ +, +t t, ( A) 2 A Σ,, Σ, ( A), Σ,,, 3 1) n s,i s Σ,i,, N 2) n 1,n 2 N, n 1 n 2 n 1 =+a,n 2 = a, a n 1 n 2 3) n 1,n 2 N, n 1 n 2 n 1 n 2, n 2 n 1 4) t n, n t term(n), n n,t term(n ) 5) t n t n, 6) I, n N I term(n)=+a,(t I), n n 1,term(n 1 ) I 7) t n, n t term(n), n n,t term(n ) 4 c, c, c= N c,( c c ) N,( ), c, (1) c (2) n 2 N c term(n 2 ), n 1 n 1 c n 2 (3) n 2 N c n 1 n 2, n 1 c n 2 (4) c ( ),,, 5 n c= N c,( c c ), n c s c, N c c, s c-height i s,i c,c-trace(s)= tr(s)(1),,tr(s)(m), m=c-height(s) 2,
258 Journal of Software Vol17, Supplement, November 2006, k p, M +t, F t, T g+g+g,, C g h+gh, g,h, gh S gh+g+h,, g h K +k, k E k h+{h} k, h, k, D k 1 {h} k +h, {h}k,, h 3, 1) B( ) X, B X A( ), A X, B 2) B X A( ),, A X, B, A B, B, 4, Ad Hoc [2,11,12], Ad Hoc [3], Ad Hoc,,, Ad Hoc,,, Ad Hoc,,,,, [4,11],,,, Ad Hoc,, Ad Hoc,, B X A( ),, A X, B( ), A X B( ),, B X, A( )
Ad Hoc 259 A B X, X, X A B( ),,, 5 SRP SRP [5 8],, [9,10] (, ) S R Message1 R D Message2 D R Message3 R S Message4,S,D,R,Message N a,k a,k 1 a,k ab,, K h ( ),, Adhoc,,, R, SRP, A R A,N a,{n a,k ab }K h R B A,R,N a,{n a,k ab }K h B R A,R,N b,{a,r,n b,k ab }K h R A A,R,N b,{a,r,n b,k ab }K h,a,b,r 51, N a,n b,k ab,k h,a,r +A,N a,{n a,k ab }K h A,R,N b,{a,r,n b,k ab }K h N a,n b,k ab,k h,a,r A,R,N a,{n a,k ab }K h +A,R,N b,{a,r,n b,k ab }K h N a,n b,k h,a,r A,N a,{n a,k ab }K h +A,R,N a,{n a,k ab }K h A,R,N b,{a,r,n b,k ab }K h +A,R,N b,{a,r,n b,k ab }K h,, 52 Σ,C, Resp[]K ab K p N a N b,n b Σ, C Init[] r,1 M K ab K p, r,1 M F r,1, F
260 Journal of Software Vol17, Supplement, November 2006 T r,1 T C g=a,n a,h={n a,k ab }K h, K h, N a r,1 C S r,1 S K r,1 K E K ab K p, r,1 E D K h, r,1 D, r,2 M K ab K p, r,2 M F r,2 F T r,2 T C g=a,r,n b,h={a,r,n b,k ab }K h, N b Σ, r,2 C S r,2 S K r,2 K E K ab K p, r,2 E D K h, r,2 D,,,, 53,,, SRP, r,2 C, r,2 M K ab K p, r,2 M F r,2, F T r,2 T C g=a,n a,{n a,k ab }K h,h=r,gh=a,r,n a,{n a,k ab }K h, C S r,2 S K r,2 K E K ab K p, r,2 E D K h, r,2 D, ( P ) A P B A, N a,{ N a, K ab } K h A, R, N a,{ N a, K ab } K h A, R, N b,{ A, R, N b, K ab } K h A, R, N b,{ A, R, N b, K ab } K h,, SRP, [6] SRP
Ad Hoc 261 6,,,,,,,,,,,,, References [1] Fan H, Feng DG Theory and Method of Secure Protocols Beijing Science Press, 2003 (in Chinese) [2] Ying C, Shi ML The architecture of the self-organized network Journal of Communications, 1999,20(9)47 54 (in Chinese with English abstract) [3] Qing SH Twenty years development of security protocols research Journal of Software, 2003,14(10)1740 1752 (in Chinese with English abstract) http//wwwjosorgcn/1000-9825/14/1740htm [4] Perkins CE, Royer EM Ad Hoc on-demand distance vector routing In Proc of the 2nd IEEE Workshop on Mobile Computing Systems and Applications New Orleans, 1999 90 100 [5] Gong L, Needham R, Yahalom R Reasoning about belief in cryptography protocols In Proc of the 1990 IEEE Symp on Research in Security and Privacy Oakland, 1990 234 248 [6] Buttyan L, Vajda I Towards provable security for Ad Hoc routing protocols 2004 http//eprintiacrorg/2004/159pdf [7] Papadimitratos P, Haas ZJ Secure routing for mobile Ad Hoc networks In SCS Communication Networks and Distributed Systems (CNDS) San Antonio, 2002 [8] Argyroudis PG, O Mahony D Secure routing for mobile Ad Hoc networks http//wwwctvrie/docs/en_pubs/secure-adhoc- routingpdf [9] Song Z, Zhang Y, Li ZJ, Chen HW Formalized description and analysis of secure protocols Computer Sciences, 2003,30(8)24 27 (in Chinese with English abstract) [10] Chen P, Liu DX, Bai YC A study of analyzing security protocols formally Computer Applications and Software, 2003,548 50 (in Chinese with English abstract) [11] Johnson D Maltz DA, Hu YC The dynamic source routing protocol for mobile Ad Hoc networks (DSR) IETF MANET Working Group 2004 http//wwwietforg/internet-drafts/draft-ietf-manet-dsr-10txt [12] Saeed R, Khatun S Ultra wide band (UWB) Ad Hoc networks Review and trends Journal of Computer Science, 2005,1(1)35 39 [1],,2003 [2],,1999,20(9)47 54 [3] 20,2003,14(10)1740 1752 http//wwwjosorgcn/1000-9825/14/1740htm [9],,,,2003,30(8)24 27 [10],,,2003,548 50 (1976 ),,,, (1965 ),,,,