Font Size: a A A

Development and evaluation of methodologies for vulnerability analysis of ad-hoc routing protocols

Posted on:2008-08-07Degree:Ph.DType:Thesis
University:University of Maryland, College ParkCandidate:Yang, Shah-AnFull Text:PDF
GTID:2448390005952279Subject:Engineering
Abstract/Summary:
his thesis presents a number methodologies for computer assisted vulnerability analysis of routing protocols in ad-hoc networks towards the goal of automating the process of finding vulnerabilities (possible attacks) on such network routing protocols and correcting the protocols. The methodologies developed are (each) based on a different representation (model) of the routing protocol, which model predicated the quantitative methods and algorithms used. Each methodology is evaluated with respect to effectiveness feasibility and possibility of application to realistically sized networks. The first methodology studied is based on formal models of the protocols and associated symbolic partially ordered model checkers. Using this methodology, a simple attack in unsecured AODV is demonstrated. An extension of the Strands model is developed which is suitable for such routing protocols. The second methodology is based on timed-probabilistic formal models which is necessary due to the probabilistic nature of ad-hoc routing protocols. This second methodolgy uses natural extensions of the first one. A nondeterministic-timing model based on partially ordered events is considered for application towards the model checking problem. Determining probabilities within this structure requires the calculation of the volume of a particular type of convex volume, which is known to be...
Keywords/Search Tags:Routing protocols, Methodologies, Ad-hoc
Related items