by of Journal of Software. All rights reserved. Tel/Fax:

Similar documents
PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS

3D Interaction Techniques Based on Semantics in Virtual Environments

OLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig

Performance Evaluation of MANET Using Quality of Service Metrics

The application trends to the real systems of an Ad hoc network. Susumu MATSUI

2005 Journal of Software. . Ad hoc ), ) A Delay Oriented Adaptive Routing Protocol for Mobile Ad hoc Networks

More Efficient Routing Algorithm for Ad Hoc Network

A Measurement-Based Path Loss Model for Mobile-to- Mobile Link Reliability Estimation

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data

Method for discovering intra-session network coding opportunity in wireless ad hoc networks

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:

Secure Reac)ve Ad Hoc Rou)ng. Hongyang Li

Performance Comparison of AODV, DSDV and ZRP Routing Protocols

CROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

Ad Hoc Networks - Routing and Security Issues

Modeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs

Survey of MANET based on Routing Protocols

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

Clipping Noise Cancellation Based on Compressed Sensing for Visible Light Communication

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.

An MNG-TL Loop Antenna for UHF Near-Field RFID Applications

Compact UWB Band-pass Filter with Single Notched Band and High Stop-band Rejection

A Research on Implementing GPS to Synchronize Sampling in a Disturbed Phase Difference s High-precision Measure System for Insulation Testing

Cheng-Yu Lee ( 李振宇 ) Education. Area of Specialty. Academic Experience. Publications Journal Papers:

DV-HOP LOCALIZATION ALGORITHM IMPROVEMENT OF WIRELESS SENSOR NETWORK

An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction

A Chinese License Plate Recognition System

Rendong Bai. Klehm Hall 4425 Phone: (217) Fax: (217)

ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET

OFFICIAL LAUNCH OF THE CHINESE TRANSLATION OF THE 2012 JORC CODE

Changjiang Yang. Computer Vision, Pattern Recognition, Machine Learning, Robotics, and Scientific Computing.

Design of Signal Conditioning Circuit for Photoelectric Sensor. , Zhennan Zhang

OLSR Standards. Emmanuel BACCELLI. INRIA / Hitachi

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP

Simulation Analysis of Control System in an Innovative Magnetically-Saturated Controllable Reactor

A high resolution FPGA based time-to-digital converter

Printed UWB MIMO Antenna with Different Polarizations and Band-Notch Characteristics

The Application of FEMA and Error-Proofing Equipment on the Shell Drawing Line of G Company Yu-bin ZHENG, Wu ZHENG*, Yue SHI, and Bin YANG

Survey on mobile under water wireless sensor net works

High voltage and large current dynamic test of SiC diodes and hybrid module

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

High Performance Visible-Blind Ultraviolet Photodetector Based on

The Tension and Temperature Automatic Control Device for the Cutting Wire of EPS Cutting Machine

Using Crowdsourced Data in Location-based Social Networks to Explore Influence Maximization

Level Surveying Method and Accuracy Analysis on Passenger Dedicated Line CP Network

Innovation Design of Engineering Experiment Based on Internet

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article

Dynamic Visual Performance of LED with Different Color Temperature

Design of Broadband Transition Structure from Microstrip to Slotline with Band Notched Characteristic

Flight Control: Challenges and Opportunities

Analysis on exciting winding electromagnetic force of Turbogenerator under rotor interturn short circuit fault

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models

RCS Reduction of Patch Array Antenna by Complementary Split-Ring Resonators Structure

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

A Parametric Recreation of Traditional Chinese Architecture

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

International Conference on Education Technology and Social Science (ICETSS 2014)

Coalface WSN Sub-area Model and Network Deployment Strategy

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Comparative Study of Microstrip Bandstop Filters Loaded With Various Dumbbell-Shaped Defected Ground Structure (DGS)

Performance Evaluation of AODV, DSR, OLSR, and GRP MANET Routing Protocols Using OPNET.

21st Century English-Chinese Dictionary Publisher: Foreign Languages Press ISBN: Binding: Hard Cover Price: 9.95

Papers. Ad Hoc Routing. Outline. Motivation

A COMPACT CPW-FED MONOPOLE ANTENNA WITH A U-SHAPED STRIP AND A PAIR OF L-SLITS GROUND FOR WLAN AND WIMAX APPLICATIONS

Engineering the light propagating features through the two-dimensional coupled-cavity photonic crystal waveguides

Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access

The Study and Applications of Sparse Methods Technology in Yunnan Mountain Substation

EWANT: The Emulated Wireless Ad Hoc Network Testbed

A survey on broadcast protocols in multihop cognitive radio ad hoc network

PROPOSED APPOINTMENT OF NON-EXECUTIVE DIRECTORS AND SUPPLEMENTAL NOTICE OF ANNUAL GENERAL MEETING

APPOINTMENT OF CHAIRMAN AND VICE CHAIRMAN OF THE BOARD OF DIRECTORS AND APPOINTMENT OF CHAIRMAN OF THE SUPERVISORY COMMITTEE

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

IEEE ComSoc Distinguished Lecture Tour Experience in China

Keywords - Ad-hoc Networks, TCP variants, Routing Protocols, AODV, DSR.

Design of a Compact and High Selectivity Tri-Band Bandpass Filter Using Asymmetric Stepped-impedance Resonators (SIRs)

Advanced Low-cost Medical Technology(Chinese Edition) By LIU JING. RAO WEI. JIA DE WEI. ZHU

Low Complexity Belief Propagation Polar Code Decoder

Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN

Bandpass-Response Power Divider with High Isolation

Electronic Supplementary Information. Synapse behavior characterization and physics mechanism of a

Conformal optical system design with a single fixed conic corrector

Intelligent Balanced Device and its Sensing System for Beam Pumping Units

Inductance of Bitter Coil with Rectangular Cross-section

X. Li, L. Yang, S.-X. Gong, and Y.-J. Yang National Key Laboratory of Antennas and Microwave Technology Xidian University Xi an, Shaanxi, China

SIMULATION AND ANALYSIS OF 60 GHz MILLIMETER- WAVE INDOOR PROPAGATION CHARACTERISTICS BASE ON THE METHOD OF SBR/IMAGE

Performance Analysis of DV-Hop Localization Using Voronoi Approach

A Novel Triple-Mode Bandpass Filter Using Half-Wavelength-Resonator-Coupled Square-Loop Resonator

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS

Chaitanya Kishor Reddi 1, Dr. S. Vijay Bhanu 2. Ph.D Scholar, Department of CSE Annamalai University, Annamalai Nagar, Tamil Nadu, India

A Compact Wideband Slot Antenna for Universal UHF RFID Reader

4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016)

Compact CPW UWB Pattern Diversity Antenna with Dual Band-notched Characteristics

Node Localization using 3D coordinates in Wireless Sensor Networks

Broadcast-based Directional Routing in Vehicular Ad-Hoc Networks

S. Zhou, J. Ma, J. Deng, and Q. Liu National Key Laboratory of Antenna and Microwave Technology Xidian University Xi an, Shaanxi, P. R.

Transcription:

ISSN 1000-9825, CODEN RUXUEW E-mail jos@iscasaccn Journal of Software, Vol17, Supplement, November 2006, pp256 261 http//wwwjosorgcn 2006 by of Journal of Software All rights reserved Tel/Fax +86-10-62562563 Ad Hoc +, (, 250014) Security Analysis for Ad Hoc Routing Protocols Based on Improved Strand Space WANG Ji-Zhi +, WANG Ying-Long (Shandong Computer Science Center, Ji nan 250014, China) + Corresponding author Phn +86-531-82605266, Fax +86-531-82962004, E-mail wangjzh@keylabnet Wang JZ, Wang YL Security analysis for ad hoc routing protocols based on improved strand space Journal of Software, 2006,17(Suppl)256 261 http//wwwjosorgcn/1000-9825/17/s256htm Abstract Based on the characteristics of Ad Hoc mobile network, the paper redefines the consistency conditions for the normal operation of the protocol and at the same time adds intermediator credibility condition, thus adapts the strand space method to the security analysis for Ad Hoc routing protocols The SRP protocol is taken as an example for the analysis of its security and the valuable results have been obtained Key words strand space secure protocol consistency condition intermediator credibility condition Ad Hoc,, Ad Hoc SRP,, Ad Hoc,, 1) 2), 3),, 4),,,,,, 1),, Supported by the Natural Science Foundation of Shandong Province of China under Grant NoQ2005G02 ( ) Received 2006-03-30 Accepted 2006-10-08

Ad Hoc 257 2), 3),,,,, 4),,,, Ad Hoc,, Ad Hoc, Ad Hoc, Ad Hoc [1] 1 (Σ,tr), Σ,,tr Σ A( ) A, A t 0 t 1 t 0 t 1 1 σ,α, α A,σ +, +t t, ( A) 2 A Σ,, Σ, ( A), Σ,,, 3 1) n s,i s Σ,i,, N 2) n 1,n 2 N, n 1 n 2 n 1 =+a,n 2 = a, a n 1 n 2 3) n 1,n 2 N, n 1 n 2 n 1 n 2, n 2 n 1 4) t n, n t term(n), n n,t term(n ) 5) t n t n, 6) I, n N I term(n)=+a,(t I), n n 1,term(n 1 ) I 7) t n, n t term(n), n n,t term(n ) 4 c, c, c= N c,( c c ) N,( ), c, (1) c (2) n 2 N c term(n 2 ), n 1 n 1 c n 2 (3) n 2 N c n 1 n 2, n 1 c n 2 (4) c ( ),,, 5 n c= N c,( c c ), n c s c, N c c, s c-height i s,i c,c-trace(s)= tr(s)(1),,tr(s)(m), m=c-height(s) 2,

258 Journal of Software Vol17, Supplement, November 2006, k p, M +t, F t, T g+g+g,, C g h+gh, g,h, gh S gh+g+h,, g h K +k, k E k h+{h} k, h, k, D k 1 {h} k +h, {h}k,, h 3, 1) B( ) X, B X A( ), A X, B 2) B X A( ),, A X, B, A B, B, 4, Ad Hoc [2,11,12], Ad Hoc [3], Ad Hoc,,, Ad Hoc,,, Ad Hoc,,,,, [4,11],,,, Ad Hoc,, Ad Hoc,, B X A( ),, A X, B( ), A X B( ),, B X, A( )

Ad Hoc 259 A B X, X, X A B( ),,, 5 SRP SRP [5 8],, [9,10] (, ) S R Message1 R D Message2 D R Message3 R S Message4,S,D,R,Message N a,k a,k 1 a,k ab,, K h ( ),, Adhoc,,, R, SRP, A R A,N a,{n a,k ab }K h R B A,R,N a,{n a,k ab }K h B R A,R,N b,{a,r,n b,k ab }K h R A A,R,N b,{a,r,n b,k ab }K h,a,b,r 51, N a,n b,k ab,k h,a,r +A,N a,{n a,k ab }K h A,R,N b,{a,r,n b,k ab }K h N a,n b,k ab,k h,a,r A,R,N a,{n a,k ab }K h +A,R,N b,{a,r,n b,k ab }K h N a,n b,k h,a,r A,N a,{n a,k ab }K h +A,R,N a,{n a,k ab }K h A,R,N b,{a,r,n b,k ab }K h +A,R,N b,{a,r,n b,k ab }K h,, 52 Σ,C, Resp[]K ab K p N a N b,n b Σ, C Init[] r,1 M K ab K p, r,1 M F r,1, F

260 Journal of Software Vol17, Supplement, November 2006 T r,1 T C g=a,n a,h={n a,k ab }K h, K h, N a r,1 C S r,1 S K r,1 K E K ab K p, r,1 E D K h, r,1 D, r,2 M K ab K p, r,2 M F r,2 F T r,2 T C g=a,r,n b,h={a,r,n b,k ab }K h, N b Σ, r,2 C S r,2 S K r,2 K E K ab K p, r,2 E D K h, r,2 D,,,, 53,,, SRP, r,2 C, r,2 M K ab K p, r,2 M F r,2, F T r,2 T C g=a,n a,{n a,k ab }K h,h=r,gh=a,r,n a,{n a,k ab }K h, C S r,2 S K r,2 K E K ab K p, r,2 E D K h, r,2 D, ( P ) A P B A, N a,{ N a, K ab } K h A, R, N a,{ N a, K ab } K h A, R, N b,{ A, R, N b, K ab } K h A, R, N b,{ A, R, N b, K ab } K h,, SRP, [6] SRP

Ad Hoc 261 6,,,,,,,,,,,,, References [1] Fan H, Feng DG Theory and Method of Secure Protocols Beijing Science Press, 2003 (in Chinese) [2] Ying C, Shi ML The architecture of the self-organized network Journal of Communications, 1999,20(9)47 54 (in Chinese with English abstract) [3] Qing SH Twenty years development of security protocols research Journal of Software, 2003,14(10)1740 1752 (in Chinese with English abstract) http//wwwjosorgcn/1000-9825/14/1740htm [4] Perkins CE, Royer EM Ad Hoc on-demand distance vector routing In Proc of the 2nd IEEE Workshop on Mobile Computing Systems and Applications New Orleans, 1999 90 100 [5] Gong L, Needham R, Yahalom R Reasoning about belief in cryptography protocols In Proc of the 1990 IEEE Symp on Research in Security and Privacy Oakland, 1990 234 248 [6] Buttyan L, Vajda I Towards provable security for Ad Hoc routing protocols 2004 http//eprintiacrorg/2004/159pdf [7] Papadimitratos P, Haas ZJ Secure routing for mobile Ad Hoc networks In SCS Communication Networks and Distributed Systems (CNDS) San Antonio, 2002 [8] Argyroudis PG, O Mahony D Secure routing for mobile Ad Hoc networks http//wwwctvrie/docs/en_pubs/secure-adhoc- routingpdf [9] Song Z, Zhang Y, Li ZJ, Chen HW Formalized description and analysis of secure protocols Computer Sciences, 2003,30(8)24 27 (in Chinese with English abstract) [10] Chen P, Liu DX, Bai YC A study of analyzing security protocols formally Computer Applications and Software, 2003,548 50 (in Chinese with English abstract) [11] Johnson D Maltz DA, Hu YC The dynamic source routing protocol for mobile Ad Hoc networks (DSR) IETF MANET Working Group 2004 http//wwwietforg/internet-drafts/draft-ietf-manet-dsr-10txt [12] Saeed R, Khatun S Ultra wide band (UWB) Ad Hoc networks Review and trends Journal of Computer Science, 2005,1(1)35 39 [1],,2003 [2],,1999,20(9)47 54 [3] 20,2003,14(10)1740 1752 http//wwwjosorgcn/1000-9825/14/1740htm [9],,,,2003,30(8)24 27 [10],,,2003,548 50 (1976 ),,,, (1965 ),,,,