Advanced Search
Volume 32 Issue 9
Oct.  2010
Turn off MathJax
Article Contents
Yan Li-Li, Peng Dai-Yuan. Security Analysis of ARAN Routing Protocol for Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2010, 32(9): 2241-2244. doi: 10.3724/SP.J.1146.2009.01265
Citation: Yan Li-Li, Peng Dai-Yuan. Security Analysis of ARAN Routing Protocol for Ad hoc Networks[J]. Journal of Electronics & Information Technology, 2010, 32(9): 2241-2244. doi: 10.3724/SP.J.1146.2009.01265

Security Analysis of ARAN Routing Protocol for Ad hoc Networks

doi: 10.3724/SP.J.1146.2009.01265
  • Received Date: 2009-09-25
  • Rev Recd Date: 2010-03-15
  • Publish Date: 2010-09-19
  • Because of the characteristics of Ad hoc networks, the theory of strand spaces can not analyzes the security of routing protocol. In this paper, the theory of strand spaces is first extended and the credibility of intermediate node is added. Subsequently, this extended theory is applied to analyzing the security of ARAN routing protocol and a new formal analysis method is proposed for Ad hoc networks routing protocol. The results show that it has replay attacks and conspiracy attacks in ARAN routing protocol. The method is proved to be valid.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3044) PDF downloads(729) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return