A framework for security analysis of mobile wireless networks

We present a framework for specification and security analysis of communication protocols for mobile wireless networks. This setting introduces new challenges which are not being addressed by classical protocol analysis techniques. The main complication stems from the fact that the actions of intermediate nodes and their connectivity can no longer be abstracted into a single unstructured adversarial environment as they form an inherent part of the system's security. In order to model this scenario faithfully, we present a broadcast calculus which makes a clear distinction between the protocol processes and the network's connectivity graph, which may change independently from protocol actions. We identify a property characterising an important aspect of security in this setting and express it using behavioural equivalences of the calculus. We complement this approach with a control flow analysis which enables us to automatically check this property on a given network and attacker specification.

[1]  Chris Hankin,et al.  Static Analysis of Routing Protocols for Ad-Hoc Networks , 2004 .

[2]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[3]  Emilio Tuosto,et al.  The Klaim Project: Theory and Practice , 2003, Global Computing.

[4]  Olin Shivers,et al.  Control flow analysis in scheme , 1988, PLDI '88.

[5]  K. V. S. Prasad A Calculus of Broadcasting Systems , 1991, Sci. Comput. Program..

[6]  Martín Abadi,et al.  Mobile values, new names, and secure communication , 2001, POPL '01.

[7]  Chris Hankin,et al.  Formal Security Analysis for Ad-Hoc Networks , 2006, Electron. Notes Theor. Comput. Sci..

[8]  Marta Z. Kwiatkowska,et al.  A Timing Analysis of AODV , 2005, FMOODS.

[9]  Flemming Nielson,et al.  Flow Logic: A Multi-paradigmatic Approach to Static Analysis , 2002, The Essence of Computation.

[10]  Flemming Nielson,et al.  The Succinct Solver Suite , 2004, TACAS.

[11]  Traian Muntean,et al.  A broadcast-based calculus for communicating systems , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[12]  F. Javier Thayer Fábrega,et al.  Strand spaces: proving security protocols correct , 1999 .

[13]  Flemming Nielson,et al.  Static validation of security protocols , 2005, J. Comput. Secur..

[14]  Lawrence C. Paulson,et al.  The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..

[15]  A GunterCarl,et al.  Formal verification of standards for distance vector routing protocols , 2002 .

[16]  Flemming Nielson,et al.  Control Flow Analysis for the pi-calculus , 1998, CONCUR.

[17]  Michael Goldsmith,et al.  A Methodology for Model-Checking Ad-hoc Networks , 2003, SPIN.

[18]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[19]  Sebastian Nanz,et al.  Specification and security analysis of mobile ad-hoc networks , 2006 .

[20]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[21]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[22]  Luca Cardelli,et al.  Mobile Ambients , 1998, FoSSaCS.

[23]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[24]  Peter Y. A. Ryan,et al.  The modelling and analysis of security protocols: the csp approach , 2000 .

[25]  Flemming Nielson,et al.  Automatic validation of protocol narration , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..

[26]  Tomasz Imielinski,et al.  Mobile Computing , 1996 .

[27]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[28]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[29]  Carl A. Gunter,et al.  Formal verification of standards for distance vector routing protocols , 2002, JACM.

[30]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[31]  Arnold Pears,et al.  Automatized Verification of Ad Hoc Routing Protocols , 2004, FORTE.

[32]  Flemming Nielson,et al.  Principles of Program Analysis , 1999, Springer Berlin Heidelberg.

[33]  Martín Abadi,et al.  A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..

[34]  Flemming Nielson,et al.  A calculus for control flow analysis of security protocols , 2004, International Journal of Information Security.

[35]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[36]  Flemming Nielson,et al.  Spatial Analysis of BioAmbients , 2004, SAS.