高级检索
    章 洋. 一种典型MANET匿名路由协议的分析与改进[J]. 计算机研究与发展, 2008, 45(7): 1142-1150.
    引用本文: 章 洋. 一种典型MANET匿名路由协议的分析与改进[J]. 计算机研究与发展, 2008, 45(7): 1142-1150.
    Zhang Yang. Formal Treatment of an Anonymous On-Demand Routing Protocol in MANETs[J]. Journal of Computer Research and Development, 2008, 45(7): 1142-1150.
    Citation: Zhang Yang. Formal Treatment of an Anonymous On-Demand Routing Protocol in MANETs[J]. Journal of Computer Research and Development, 2008, 45(7): 1142-1150.

    一种典型MANET匿名路由协议的分析与改进

    Formal Treatment of an Anonymous On-Demand Routing Protocol in MANETs

    • 摘要: 鉴于现有MANET匿名路由协议中不明确的敌手模型、未知安全性的密码学原语以及非严格的分析方法不能提供协议匿名性的信任,因此,对其中一种有代表性的匿名DSR进行了分析与改进.先从定义敌手攻击能力的角度明确敌手模型,并以数据分组与端节点不可关联性为目标定义协议的理想过程.然后,在路由发现阶段获得由UC安全的会话密钥组成的路径,在数据传输阶段用该密钥构造可验证的轻型路由洋葱.最后,在UC框架中基于理想过程证明协议的匿名性.

       

      Abstract: Existing anonymous routing protocols have only had unsatisfactory anonymity analysis in MANETs, because adversarial models have not been given exactly,the security definition of cryptographic primitives have not been described, and rigorous proofs are lacking. To address this problem a typical anonymous dynamic source routing protocol is improved, and the formal treatment of this protocol is then proposed in this paper. The static attack power is defined for adversarial models to clarify the capacity of adversaries, and the anonymity of a routing protocol is to be achieved if the identities of end users are unlikable to data packets. According to this definition, a UC-style ideal functionality for route discovery process and the one for data transmission process are defined respectively. The route discovery process is modified to get private paths by generating UC-secure session-keys, which realizes the ideal functionality for route discovery. Then, verifiable lightweight route onions are constructed to realize the ideal functionality for data transmission, i.e., the route onions can verify that upstream nodes shuffle data packets correctly and downstream paths are intact. Finally, the anonymity of the improved protocol is proved in the universal composition framework. The methodology used is also suitable for designing and analyzing other anonymous routing protocols in wireless networks.

       

    /

    返回文章
    返回