Security analysis of routing protocol for MANET based on extended Rubin logic

One of the greatest obstacles to wide-spread deployment of MANET is security. Security of routing protocols for MANET is the emphasis of MANET security. However, it is difficult to design protocols that are immune to malicious attack, because good analysis techniques are lacking. Rubin logic is the first technique for specifying and analyzing nonmonotonic cryptographic protocols, though it is inadequate to analyze non-repudiation of protocols. Considered the property of routing protocols for MANET, extensions to Rubin logic are presented in this paper. A new local set as well as new actions and inference rules are introduced. The extended Rubin logic can be used to analyze non-repudiation of protocols. Taken example of ARAN, the security of routing protocol is analyzed by using the extended Rubin logic, which proves the method is valid.

[1]  Paul C. van Oorschot,et al.  Extending cryptographic logics of belief to key agreement protocols , 1993, CCS '93.

[2]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[3]  Peter Honeyman,et al.  Nonmonotonic cryptographic protocols , 1994, Proceedings The Computer Security Foundations Workshop VII.

[4]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[5]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[6]  Wang Cai A New Approach for the Analysis of Electronic Commerce Protocols , 2004 .

[7]  Mark R. Tuttle,et al.  A Semantics for a Logic of Authentication , 1991, PODC 1991.

[8]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[9]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[10]  Aviel D. Rubin Extending NCP for protocols using public keys , 1997, Mob. Networks Appl..

[11]  Dan M. Nessett,et al.  A critique of the Burrows, Abadi and Needham logic , 1990, OPSR.

[12]  J P Robinson,et al.  Protest rock and drugs. , 1976, The Journal of communication.

[13]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[14]  Rajashekar Kailar Accountability in Electronic Commerce Protocols , 1996, IEEE Trans. Software Eng..

[15]  Zhou Dian Limitations of Kailar Logic , 1999 .

[16]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[17]  Paul F. Syverson,et al.  On unifying some cryptographic protocol logics , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[18]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[19]  Li Xing BAN-like logic for cryptographic protocols analysis: a survey , 2002 .

[20]  Seung Yi,et al.  A Security-Aware Routing Protocol for Wireless Ad Hoc Networks , 2002 .

[21]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[22]  Wang Mei-qin Security analysis of routing protocol for MANET based on BAN logic , 2005 .