首页> 外文会议>International conference on cryptology and network security >A Formal Environment for MANET Organization and Security
【24h】

A Formal Environment for MANET Organization and Security

机译:MANET组织和安全的正式环境

获取原文

摘要

A Mobile Ad-hoc Network (MANET) allows the communication of autonomous nodes without any preexistent network infrastructure. This main characteristic may introduce several vulnerabilities which can be exploited by malicious nodes. Thus, one of the basic requirements for the well behavior of such network is to detect and isolate such nodes. Recently, we proposed a reputation based trust management scheme detecting and isolating malicious nodes. This scheme was built upon a specific clustering algorithm baptized MCA (Mobility-based Clustering Approach) and based on two phases: the setting up and the maintenance. In the setting up phase, stable clusters are generated with one-hop members and elected cluster-heads (CHs). In the maintenance phase, the organization of the clusters is maintained in presence of mobility using adequate algorithms. The whole proposition was called TMCA (Trust based MCA) and was also extended with a delegation process resulting a proposition baptized DTMCA (Delegation process TMCA). Once DTMCA is defined, we have found important to validate formally each one of its components in order to avoid any conflict, lack or misbehaving situations. This process requires in a first step a formal specification. This is our main concern in this paper where we propose in a first part a formal specification using inference systems based on logical rules. Two inference systems are proposed. The first one handles the MCA maintenance phase and the second one specifies the TMCA scheme on which the delegation process is integrated. A formal validation using these inference systems is proposed in a second step in order to prove the soundness and the completeness of the various propositions.
机译:移动ad-hoc网络(MANET)允许自主节点的通信,而无需任何预先存在的网络基础架构。这个主要特征可能会引入几种漏洞,该漏洞可以被恶意节点利用。因此,这种网络的井行为的基本要求之一是检测和隔离这样的节点。最近,我们提出了一种基于信誉的信任管理方案,检测和隔离恶意节点。该方案是基于特定的聚类算法受洗MCA(基于移动性的聚类方法),并基于两个阶段:设置和维护。在设置阶段,使用单跳成员和选举集群头(CHS)生成稳定的群集。在维护阶段,使用足够的算法在移动性存在下维持群集的组织。整个命题称为TMCA(基于信任的MCA),也与委派过程延长,导致命题受洗DTMCA(委派过程TMCA)。一旦定义了DTMCA,我们就找到了正式验证其每个组件的重要性,以避免任何冲突,缺乏或行为不端的情况。此过程在第一步中需要正式规范。这是我们在本文中的主要关注点,其中我们在第一部分使用基于逻辑规则的推理系统的正式规范。提出了两个推理系统。第一个处理MCA维护阶段,第二个将指定集成了委派过程的TMCA方案。在第二步中提出了使用这些推理系统的正式验证,以证明各种命题的声音和完整性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号