Analysing Routing Protocols: Four Nodes Topologies Are Sufficient

被引:0
|
作者
Cortier, Veronique [1 ]
Degrieck, Jan [1 ,2 ]
Delaune, Stephanie [2 ]
机构
[1] CNRS, LORIA, F-75700 Paris, France
[2] CNRS, INRIA, ENS Cachan, LSV, Ile, France
来源
PRINCIPLES OF SECURITY AND TRUST, POST 2012 | 2012年 / 7215卷
基金
欧洲研究理事会;
关键词
SECURITY ANALYSIS; TOOL;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Routing protocols aim at establishing a route between nodes on a network. Secured versions of routing protocols have been proposed in order to provide more guarantees on the resulting routes. Formal methods have proved their usefulness when analysing standard security protocols such as confidentiality or authentication protocols. However, existing results and tools do not apply to routing protocols. This is due in particular to the fact that all possible topologies (infinitely many) have to be considered. In this paper, we propose a simple reduction result: when looking for attacks on properties such as the validity of the route, it is sufficient to consider topologies with only four nodes, resulting in a number of just five distinct topologies to consider. As an application, we analyse the SRP applied to DSR and the SDMSR protocols using the ProVerif tool.
引用
收藏
页码:30 / 50
页数:21
相关论文
共 50 条
  • [1] Modelling and Analysing Routing Protocols Diagrammatically with Bigraphs
    Albalwe, Maram
    Archibald, Blair
    Sevegnani, Michele
    FORMAL ASPECTS OF COMPUTING, 2024, 36 (03)
  • [2] The effect of cooperation of nodes on VDTN routing protocols
    Benamar, Maria
    Benamar, Nabil
    El Ouadghiri, Driss
    2015 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2015, : 85 - 91
  • [3] Routing Protocols Selection based on Number of Nodes
    Asole, Suresh S.
    Jawandhiya, Pradeep M.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [4] Performance Evaluation of Routing Protocols in WSNs Arranged in Linear Topologies
    Bergesio, Luca
    Franceschinis, Mirko
    Spirito, Maurizio
    Tomasi, Riccardo
    INTERNET OF THINGS-BOOK, 2010, : 27 - 38
  • [5] Impact of Selfish Nodes on the Performance of AODV and DSR Routing Protocols
    Pandey, Priyanka
    Singh, Raghuraj
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT I, 2023, 1797 : 349 - 361
  • [6] Experimental Performance Assessment of WMN Routing Protocols with Mobile Nodes
    Reineri, Massimo
    Rubino, Roberto
    Casetti, Claudio
    Chiasserini, Carla-Fabiana
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 1010 - 1015
  • [7] Analysis and Feasibility of Reactive Routing Protocols with Malicious Nodes in MANETs
    Jain, Shilpi
    Shastri, Alankar
    Chaurasia, Brijesh Kumar
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 356 - 360
  • [8] Performance analysis of four routing protocols in sensor networks
    Bellaachia, Abdelghani
    Weerasinghe, Nilkamal
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2008, 3 (03) : 167 - 173
  • [9] SUFFICIENT TOPOLOGIES AND NORMS
    MUSHTARI, DK
    CHUPRUNOV, AN
    THEORY OF PROBABILITY AND ITS APPLICATIONS, 1984, 28 (04) : 736 - 751
  • [10] A Distributed Prevention Scheme from Malicious Nodes in VANETs' Routing Protocols
    Bouali, Tarek
    Sedjelmaci, Hichem
    Senouci, Sidi-Mohammed
    2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, 2016,