Modeling and Analysis of Secure Ad Hoc Routing Protocol SRP

Shicong Zhang,Chenhui Gu,Huanyu Zhou,Yisha Liu,Wanli Huo,Chunyan Fu,Zhaojuan Zhang
DOI: https://doi.org/10.1109/access.2024.3409160
IF: 3.9
2024-01-01
IEEE Access
Abstract:Security analysis of ad hoc routing protocols in an adversarial environment is a challenging task. The paper utilizes Event-B to model and verify the Secure Routing Protocol (SRP), a secure on-demand source routing protocol. The expected goal of routing protocols is to find correct routes. Thus a generic definition for determining the correctness of discovered routes was proposed in the paper. The paper presents the system assumptions and system requirements that are required to be implemented in the model. The paper gradually introduces the dynamic network topology, the operations of secure source routing and various route disruption attacks into the model with the refinement mechanism of Event-B. As a result, the paper discovers some attacks against this protocol, which arise from the mobility of wireless networks and operations of malicious nodes. In particular, it is available to extend the model to include more route disruption attacks. The formalization provides reference to analyze other secure source routing protocols, such as Ariadne.
What problem does this paper attempt to address?