Modeling and verifying the Ariadne protocol using process algebra
Author(s) -
Xi Wu,
Huibiao Zhu,
Yongxin Zhao,
Zheng Wang,
Si Liu
Publication year - 2013
Publication title -
computer science and information systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.244
H-Index - 24
eISSN - 2406-1018
pISSN - 1820-0214
DOI - 10.2298/csis120601009w
Subject(s) - computer science , protocol (science) , node (physics) , computer network , process calculus , routing protocol , distributed computing , process (computing) , mobile ad hoc network , routing (electronic design automation) , wireless ad hoc network , theoretical computer science , programming language , network packet , operating system , wireless , medicine , alternative medicine , structural engineering , pathology , engineering
Mobile Ad Hoc Networks (MANETs) are formed dynamically by mobile nodes without the support of prior stationary infrastructures. In such networks, routing protocols, particularly secure ones are always the essential parts. Ariadne, an efficient and well-known on-demand secure protocol of MANETs, mainly concerns about how to prevent a malicious node from compromising the route. In this paper, we apply the method of process algebra Communicating Sequential Processes (CSP) to model and reason about the Ariadne protocol, focusing on the process of its route discovery. In our framework, we consider the communication enti-ties as CSP processes, including the initiator, the intermediate nodes and the target. Moreover, we also propose an intruder model allowing the in-truder to learn and deduce much information from the protocol and the environment. Note that the modeling approach is also applicable to other protocols, which are based on the on-demand routing protocols and have the route discovery process. Finally, we use PAT, a model checker for CSP, to verify whether the model caters for the specification and the non-trivial secure properties, e.g. nonexistence of fake path. Three case studies are given and the verification results naturally demonstrate that the fake rout-ing attacks may be present in the Ariadne protocol.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom