首页 | 本学科首页   官方微博 | 高级检索  
     

基于SPI演算的移动自主网络安全路由协议分析
引用本文:王英龙,徐东红,王美琴,高仲合.基于SPI演算的移动自主网络安全路由协议分析[J].计算机工程与应用,2006,42(6):132-135.
作者姓名:王英龙  徐东红  王美琴  高仲合
作者单位:1. 山东大学信息科学与工程学院,济南,250100
2. 曲阜师范大学计算机科学学院,日照,276826;山东省计算机中心,济南,250014
3. 山东省计算机中心,济南,250014
4. 曲阜师范大学计算机科学学院,日照,276826
基金项目:教育部科学技术研究项目
摘    要:安全协议是许多分布式系统安全的基础,也是MANET网络的基础,确保MANET路由协议的安全运行是极为重要的。对于MANET的特点,设计一个可靠的安全路由协议是必须的,也是一个艰巨的任务,但大多数的安全路由协议都是通过模拟结果来进行解释的,缺乏严格形式化分析来确保其安全属性。在传统的安全属性中,加密协议已经被形式化分析许多年了,然而去形式化分析移动adhoc网路由协议的工作并没有出现已成熟的方法和理论的文献。论文针对SRP(secureroutingprotocol)协议模型用SPI演算做出形式化分析,在论文提出的攻击者进程模型下,可以推导出SRP产生一定的脆弱性。

关 键 词:安全路由协议  安全性  移动自主网  SPI演算  SRP抽象解释
文章编号:1002-8331-(2006)06-0132-04
收稿时间:2005-07
修稿时间:2005-07

Security Analysis of Routing Protocol for MANET Based on SPI Calculus
Wang Yinglong,Xu Donghong,Wang Meiqin,Gao Zhonghe.Security Analysis of Routing Protocol for MANET Based on SPI Calculus[J].Computer Engineering and Applications,2006,42(6):132-135.
Authors:Wang Yinglong  Xu Donghong  Wang Meiqin  Gao Zhonghe
Affiliation:1.School of Information Science and Engineering,Shandong University,Jinan 250100;2.School of Computer Science,Qufu Normal University,Rizhao 276826;3.Shandong Computer Science Center,Jinan 250014
Abstract:Security protocol is the basis for the distributed system,the same is required of the manet,it is important to ensure the running of this protocols.According to the character of manet,it is necessary to design reliable secure routing protocol and it is a hard task.But new protocols are predominantly validated by an interpretation of simulation results, thus lacking a rigid formal analysis necessary for ensuring security.It has been analysed by formalization for a lot of years in traditional cryptograph protocol attribute,however it appears no mature formal method and reference in formal analysis mobile ad hoc network security routing protocol.Tbe article presents a formal analysis of the SRP routing protocols that are suitable to the mobile Ad hoc network and in the circumstance of attacker model described in the article.The authors abstract the attack and conclude that protocols developed in the likeness of SRP are equally vulnerable.The analysis follows the methodology of SPI calculus and abstract interpretation.
Keywords:SRP
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号