Wireless Network Security Threats on Ad-Hoc Network Using Calculi Modeling and Formal Analysis for Trustworthy Based Time Management

R Mahesh Kumar, R Suresh Kumar

Abstract


Wireless systems consist of wireless devices which communicate with each other by means of a radio frequency channel. This networking paradigm occurs  much convenience, but because of the use of the wireless medium it is inherently vulnerable to many threats. As a consequence, security represents an important issue. Security mechanisms developed for wired systems present many limitations when used in a wireless context. The main problems stem from the fact that they operate in a centralized manner and under the assumption of a “closed world". Formal techniques are therefore needed to establish a mathematically rigorous connection between modelling and security goals.

 

Her I propose a timed process calculus modelling the communication features of wireless systems and enjoying some desirable time properties. The presence of time allows us to reason about communication collisions. Also provide behavioral equivalences and we prove a number of algebraic laws. And illustrate the usability of the calculus to model the Carrier Sense Multiple Access scheme, a widely used MAC level protocol in which a device senses the channel before transmitting [1]. Finally,I extend the trust-based calculus with timing aspects to reason about the relationship between trust and time.  Then apply our calculus to formalize the routing protocol ARAN for ad hoc networks.


Keywords


Wireless Communication and Security, Formal Techniques, calculus modeling, CSMA, Bi-simulation Proof Model, Security Threats, ARAN ad hoc networks.

References


IEEE 802.15. ANSI/IEEE Standard 802.15: Wireless MAC and PHY Specifications for Low Rate WPAN. IEEE Computer Society, 2005.

IEEE 802.16. ANSI/IEEE Standard 802.16: Air Interface for Fixed Broadband Wireless Access Systems. IEEE Computer Society, 2004.

Martin Abadi. Secrecy by Typing in Security Protocols. ,46(5):749{786, 1999.

Martin Abadi and Bruno Blanchet. Analyzing Security Protocols with Secrecy Types and Logic Programs. 52(1):102{146, 2005.

Martin Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. A Calculus for Access Control in Distributed Systems. ACM Transaction on Programming Languages and Systems, 15(4):706{734, 1993.

Martin Abadi and Andrew D. Gordon. A Calculus for Cryptographic Protocols:The spi Calculus. Information and Compututation, 148(1):1{70, 1999.

Alfarez Abdul-Rahman and Stephen Hailes. Supporting Trust in Virtual Communities.In HICSS, volume 6, pages 6007{6016. IEEE Computer Society, 2000.

Luca Aceto and Matthew Hennessy. Towards Action-Refinenement in Process Algebras.Information and Computation, 103(2):204{269, 1993.

Gergely Acs, Levente Buttyan, and Istvan Vajda. Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks. IEEE Transaction on Mobile Computing, 5(11):1533{1546, 2006.

Efthimia Aivaloglou, Stefanos Gritzalis, and Charalabos Skianis. Trust Establishment in Sensor Networks: Behaviour-based, Certificate-based and a Combinational Approach. 1(1{2):128{148,2008.

Alessandro Aldini, Mario Bravetti, and Roberto Gorrieri. A Process-Algebraic Approach for the Analysis of Probabilistic Non-interference 12(2):191{245, 2004.

Alessandro Aldini and Alessandra Di Pierro. A Quantitative Approach to Noninterference for Probabilistic Systems. Electronic Notes of Theoretical Computer Science, 99:155{182, 2004.

David Elliott Bell and Leonard J. LaPadula. Secure Computer System: United Exposition and Multics Interpretation. Technical Report MTR-2997, MITRE Corporation,1976.

Jan A. Bergstra and Jan Willem Klop. Fixed Point Semantics in Process Algebra Technical Report Tech. Report IW 208, Mathematical Centre, Amsterdam, 1982.

Jan A. Bergstra and Jan Willem Klop. Process Algebra for Synchronous Communication. Information and Computation, 60:109{137, 1984.

Jan A. Bergstra and Jan Willem Klop. Algebra for Communicating Processes with Abstraction. Theoretical Computer Science, 37(1):77{121, 1985.

Fujun Feng, Chuang Lin, and Junshan Li. An Access Control Model for Trustworthy Network. Networks Security, Wireless Communications and Trusted Computing,1:308

Massimo Merro and Eleonora Sibilio. A Timed Calculus for Wireless Systems.Technical Report 75/2009, Department of Computer Science.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

.......................................................................................................................................................................................................................

ISSN  2279 – 0381 |  IST HOMEJOURNAL HOME | Copyright IST 2012-13

.......................................................................................................................................................................................................................