DocumentCode :
2295537
Title :
A Security Calculus of Concurrent Objects for Verifying Ad Hoc Network Protocols
Author :
Li, Qin ; Zeng, Qingkai
Author_Institution :
Dept. of Comput. Sci. & Technol., Nanjing Univ., Nanjing, China
fYear :
2009
fDate :
19-21 Oct. 2009
Firstpage :
232
Lastpage :
239
Abstract :
We present a calculus of concurrent objects for specification and security analysis of ad hoc security protocols. The communicating nodes and the network are modeled by objects, while the interactions between them are modeled by asynchronous method invocations. The internal state of an object is represented by a constant method which can be overridden. The approach is complemented by a control flow analysis which can be used to automatically check properties such as security routing. The attacker model is integrated into the analysis as set values containing the knowledge of the attacker.
Keywords :
ad hoc networks; cryptographic protocols; routing protocols; telecommunication security; ad hoc network protocol; asynchronous method invocation; attacker model; concurrent object; control flow analysis; cryptographic operation; routing service; security calculus; Ad hoc networks; Authentication; Automatic control; Calculus; Computer science; Computer security; Internet; Object oriented modeling; Routing protocols; Telephony; ad hoc networks; concurrent objects; control-flow analysis; secure routing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network and System Security, 2009. NSS '09. Third International Conference on
Conference_Location :
Gold Coast, QLD
Print_ISBN :
978-1-4244-5087-9
Electronic_ISBN :
978-0-7695-3838-9
Type :
conf
DOI :
10.1109/NSS.2009.12
Filename :
5319015
Link To Document :
بازگشت