A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks: Corrected Version

Abstract : Many cryptographic protocols aim at ensuring the route validity in ad-hoc networks, i.e. the established route representing an exists path in the network. However, flaws have been found in some protocols that are claimed secure (e.g. the attack on SRP applied to DSR). Some formal models and reduction proofs have been proposed to give more guarantees when verifying route validity and facilitate verification process. The existing approaches assume the cooperative attacker model. In this paper, we consider the non-cooperative attacker model, and we show that verifying the route validity under the non-cooperative model requires to verify only five topologies, each containing four nodes, and to consider only three malicious (compromised) nodes. Furthermore, we prove that a protocol is secure for any topology under the non-cooperative model, if and only if, it is secure for any topology under the cooperative model.
Document type :
Conference papers
Complete list of metadatas

Cited literature [12 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-01759222
Contributor : Pascal Lafourcade <>
Submitted on : Thursday, April 5, 2018 - 11:22:29 AM
Last modification on : Friday, March 15, 2019 - 1:14:47 AM

File

KLL13.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-01759222, version 1

Collections

Citation

Ali Kassem, Pascal Lafourcade, Yassine Lakhnech. A More Realistic Model for Verifying Route Validity in Ad-Hoc Networks: Corrected Version. Foundations and Practice of Security - 6th International Symposium, , Oct 2013, La Rochelle,, France. ⟨hal-01759222⟩

Share

Metrics

Record views

90

Files downloads

17