home search a-z help
University of Cambridge Logic and Semantics Seminar
19 May 2006: Sebastian Nanz
Computer Laboratory > Research > TSG > Logic and Semantics Seminar > 19 May 2006: Sebastian Nanz

Speaker: Sebastian Nanz, Imperial
Title: Specification and Security Analysis of Mobile Ad-Hoc Networks
Time: 19 May 2006, 2.00pm
Venue: William Gates Building, room FW11
Abstract:

Mobile ad-hoc networks consist of mobile wireless devices which autonomously organise their communication infrastructure. Because of the simple network deployment this networking paradigm offers much convenience, but security turns out to be an important concern when considering the threats implied in using the wireless medium. In order to eliminate such concerns, formal specification and analysis techniques have to be used so that the employed communication protocols can be proved secure or their vulnerabilities exposed. While many such frameworks have been proposed for the analysis of classical security protocols, the challenges of the new setting prevent these from being applied directly. The main complication stems from the fact that the actions of intermediate nodes and their connectivity can no longer be abstracted into a single unstructured adversarial environment as they form an inherent part of the system's security.

In this talk we present a framework for modelling and reasoning about mobile ad-hoc networks and their security needs. Communication protocols are specified using a broadcast process calculus which makes a clear distinction between the protocol processes and the network's connectivity graph, which may change independently from protocol actions. This modelling formalism is complemented by a control flow analysis which yields an overapproximation of the possible behaviour of a network specified with the calculus. The results obtained from the analysis can be used to establish a behavioural equivalence for networks which in turn is used to specify security requirements. We have analysed two real-world routing protocols for mobile ad-hoc networks using a prototype implementation of this framework and present some of the exposed attacks.