{"title":"The Security Analysis for Ad Hoc Routing Protocols Based on Improved Strand Space","authors":"","doi":"10.1109/SPCA.2006.297489","DOIUrl":null,"url":null,"abstract":"Strand space is often used to analyze the secure protocols. However, the protocol consistency conditions defined by strand space do not satisfy the characteristics of ad hoc routing protocol. Based on the characteristics of ad hoc mobile network, the thesis re-defines the consistency conditions for the normal operation of the protocol and at the same time adds intermediator credibility condition, thus adapts the strand space method to the security analysis for ad hoc routing protocols. The SRP protocol is taken as an example for the analysis of its security, and accordingly valuable results have been obtained","PeriodicalId":232800,"journal":{"name":"2006 First International Symposium on Pervasive Computing and Applications","volume":"119 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 First International Symposium on Pervasive Computing and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPCA.2006.297489","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Strand space is often used to analyze the secure protocols. However, the protocol consistency conditions defined by strand space do not satisfy the characteristics of ad hoc routing protocol. Based on the characteristics of ad hoc mobile network, the thesis re-defines the consistency conditions for the normal operation of the protocol and at the same time adds intermediator credibility condition, thus adapts the strand space method to the security analysis for ad hoc routing protocols. The SRP protocol is taken as an example for the analysis of its security, and accordingly valuable results have been obtained