Verifying security protocols with Brutus
ACM Transactions on Software Engineering and Methodology (TOSEM)
Athena: a novel approach to efficient automatic security protocol analysis
Journal of Computer Security
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Formal verification of standards for distance vector routing protocols
Journal of the ACM (JACM)
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Using SPIN to Verify Security Properties of Cryptographic Protocols
Proceedings of the 9th International SPIN Workshop on Model Checking of Software
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Secure Link State Routing for Mobile Ad Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Automated analysis of cryptographic protocols using Mur/spl phi/
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
The Temporal Logic of Programs
The Temporal Logic of Programs
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A framework for security analysis of mobile wireless networks
Theoretical Computer Science - Automated reasoning for security protocol analysis
iKP: a family of secure electronic payment protocols
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Finite-state analysis of SSL 3.0
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Spin model checker, the: primer and reference manual
Spin model checker, the: primer and reference manual
Automated Evaluation of Secure Route Discovery in MANET Protocols
SPIN '08 Proceedings of the 15th international workshop on Model Checking Software
A methodology for model-checking ad-hoc networks
SPIN'03 Proceedings of the 10th international conference on Model checking software
FMOODS'05 Proceedings of the 7th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems
Generic verification of security protocols
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
Formal methods for specification and analysis of communication protocols
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile terminals, connected by wireless links. In such environments, delivering communication guarantees has hardly been achieved by any protocol in its entirety. In this work, we model the secure on-demand routing protocol Ariadne, in order to verify one of its powerful security properties by model checking. We use the SPIN model checker to identify a sequence of possible events leading to a new attack, where two compromised nodes collaborate to remove all intermediate nodes from the route discovery process. To the best of our knowledge, the new attack can not be thwarted by any detection and prevention mechanism known to date.