Abstract
Analyses of routing protocols security are nearly always supported by simulations, which often evaluate the ability to deliver messages to a given destination. Several competing definitions for secure routing exist, but to our knowledge, they only address source routing protocols. In this paper, we propose the notion of corruptibility, a quantitative computational definition for routing security based on the attacker’s ability to alter the routes used by messages. We first define incorruptibility, and we follow with the definition of bounded corruptibility, which uses two routing protocols as bounds for the evaluated protocol. These definitions are then illustrated with several routing algorithms.
This research was conducted with the support of the “Digital trust” Chair from the Foundation of the University of Auvergne.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ács, G., Buttyán, L., Vajda, I.: Provably secure on-demand source routing in mobile ad hoc networks. Trans. Mob. Comput. 5(11), 1533–1546 (2006)
Bellare, M.: A note on negligible functions. J. Cryptol. 15(4), 271–284 (2002)
Bono, V.J.: 7007 explanation and apology. Appears in NANOG mailing list (1997)
Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. Roy. Soc. Lond. A. Math. Phys. Sci. 426(1871), 233–271 (1989)
Buttyán, L., Thong, T.V.: Formal verification of secure ad-hoc network routing protocols using deductive model-checking. In: Wireless and Mobile Networking Conference (WMNC 2010), pp. 1–6. IEEE (2010)
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281–308 (1988)
Hiran, R., Carlsson, N., Gill, P.: Characterizing large-scale routing anomalies: a case study of the China Telecom incident. In: Roughan, M., Chang, R. (eds.) PAM 2013. LNCS, vol. 7799, pp. 229–238. Springer, Heidelberg (2013)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2–3), 293–315 (2003)
Kent, S.T.: Securing the border gateway protocol: a status update. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 40–53. Springer, Heidelberg (2003)
Lougheed, K., Rekhter, Y.: Border Gateway Protocol (BGP). RFC 1105 (Experimental), June 1989. Obsoleted by RFC 1163
Marshall, J.: An analysis of SRP for mobile ad hoc networks. In: International Multiconference in Computer Science (IMECS 2002), pp. 18–21 (2002)
Murphy, S.: BGP Security Vulnerabilities Analysis. RFC 4272, January 2006
Nordström, O., Dovrolis, C.: Beware of BGP attacks. ACM SIGCOMM Comput. Commun. Rev. 34(2), 1–8 (2004)
Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), pp. 193–204 (2002)
Wu, B., Chen, J., Wu, J., Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Xiao, Y., Shen, X.S., Du, D.-Z. (eds.) Wireless Network Security, pp. 103–135. Springer, New York (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Jamet, R., Lafourcade, P. (2015). (In)Corruptibility of Routing Protocols. In: Cuppens, F., Garcia-Alfaro, J., Zincir Heywood, N., Fong, P. (eds) Foundations and Practice of Security. FPS 2014. Lecture Notes in Computer Science(), vol 8930. Springer, Cham. https://doi.org/10.1007/978-3-319-17040-4_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-17040-4_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-17039-8
Online ISBN: 978-3-319-17040-4
eBook Packages: Computer ScienceComputer Science (R0)