Verification of a VANET protocol IC-29 miniproject

نویسنده

  • Marcin Poturalski
چکیده

This report summarizes a miniproject carried out in the scope or the IC-29 course (Self-Organized Wireless and Sensor Networks). The goal of the project was to verify a VANET protocol, namely the Distributed Revocation Protocol (DRP, [1]). This protocol was chosen because of its ad-hoc nature, which makes the verification both interesting and challenging, while being relatively simple, this protocol works. The initial idea was to apply (semi)-automatic verification techniques and tools, like the security model-checker OFMC ([3]). However, in the end manual verification was performed, because OFMC and similar security verification techniques proved not to be suitable for the purpose of DRP verification; additionally, it was possible to detect attacks against the protocol remaining on the non-automatic level. The report develops as follows. First, the VANET environment and the general revocation scheme is described, to give the reader an understanding where DRP fits in. Next, the definition of DRP that will be used for verification is introduced; this section is based on [1] and on interaction with the authors of this paper. The latter was necessary, because [1] does not describe in all detail how the protocol works. The following sections presents the adversary model and specify the properties that the protocol should fulfil (these were partly inspired by [4]). Finally, I give a list of discovered attacks, and conclude. This order of presentation, quite common in verification practice, is usual in cases where verification comes into the picture after the protocol is defined. This differs from the ideal verification approach, where the formal properties are specified before the protocol is defined.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Framework for Secure Routing in VANET

Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...

متن کامل

Modeling of VANET Technology & Ad-Hoc Routing Protocols Based on High Performance Random Waypoint Models

Today, one of the new technologies in the modern era is Vehicular Ad-hoc Network which has takenenormous attention in the recent years. Because of rapid topology changing and frequent disconnectionmakes it difficult to design an efficient routing protocol for routing data between vehicles, called V2V orvehicle to vehicle communication and vehicle to roadside infrastructure, called V2I. Designin...

متن کامل

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

Web Service Choreography Verification Using Z Formal Specification

Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...

متن کامل

A Self-Authentication and Deniable Efficient Group Key Agreement Protocol for VANET

With the rapid development of vehicular ad hoc Network (VANET), it is gaining significant popularity and receiving increasing attentions from academics and industry in security and efficiency. To address security and efficiency issues, a selfauthentication and deniable efficient group key agreement protocol is proposed in this paper. This scheme establishes a group between road-side unit (RSU) ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006