Skip to main content

(In)Corruptibility of Routing Protocols

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8930))

Included in the following conference series:

  • 859 Accesses

Abstract

Analyses of routing protocols security are nearly always supported by simulations, which often evaluate the ability to deliver messages to a given destination. Several competing definitions for secure routing exist, but to our knowledge, they only address source routing protocols. In this paper, we propose the notion of corruptibility, a quantitative computational definition for routing security based on the attacker’s ability to alter the routes used by messages. We first define incorruptibility, and we follow with the definition of bounded corruptibility, which uses two routing protocols as bounds for the evaluated protocol. These definitions are then illustrated with several routing algorithms.

This research was conducted with the support of the “Digital trust” Chair from the Foundation of the University of Auvergne.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ács, G., Buttyán, L., Vajda, I.: Provably secure on-demand source routing in mobile ad hoc networks. Trans. Mob. Comput. 5(11), 1533–1546 (2006)

    Article  Google Scholar 

  2. Bellare, M.: A note on negligible functions. J. Cryptol. 15(4), 271–284 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  3. Bono, V.J.: 7007 explanation and apology. Appears in NANOG mailing list (1997)

    Google Scholar 

  4. Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proc. Roy. Soc. Lond. A. Math. Phys. Sci. 426(1871), 233–271 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  5. Buttyán, L., Thong, T.V.: Formal verification of secure ad-hoc network routing protocols using deductive model-checking. In: Wireless and Mobile Networking Conference (WMNC 2010), pp. 1–6. IEEE (2010)

    Google Scholar 

  6. Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281–308 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  7. Hiran, R., Carlsson, N., Gill, P.: Characterizing large-scale routing anomalies: a case study of the China Telecom incident. In: Roughan, M., Chang, R. (eds.) PAM 2013. LNCS, vol. 7799, pp. 229–238. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  8. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2–3), 293–315 (2003)

    Article  Google Scholar 

  9. Kent, S.T.: Securing the border gateway protocol: a status update. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 40–53. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Lougheed, K., Rekhter, Y.: Border Gateway Protocol (BGP). RFC 1105 (Experimental), June 1989. Obsoleted by RFC 1163

    Google Scholar 

  11. Marshall, J.: An analysis of SRP for mobile ad hoc networks. In: International Multiconference in Computer Science (IMECS 2002), pp. 18–21 (2002)

    Google Scholar 

  12. Murphy, S.: BGP Security Vulnerabilities Analysis. RFC 4272, January 2006

    Google Scholar 

  13. Nordström, O., Dovrolis, C.: Beware of BGP attacks. ACM SIGCOMM Comput. Commun. Rev. 34(2), 1–8 (2004)

    Article  Google Scholar 

  14. Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), pp. 193–204 (2002)

    Google Scholar 

  15. Wu, B., Chen, J., Wu, J., Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Xiao, Y., Shen, X.S., Du, D.-Z. (eds.) Wireless Network Security, pp. 103–135. Springer, New York (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raphaël Jamet .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Jamet, R., Lafourcade, P. (2015). (In)Corruptibility of Routing Protocols. In: Cuppens, F., Garcia-Alfaro, J., Zincir Heywood, N., Fong, P. (eds) Foundations and Practice of Security. FPS 2014. Lecture Notes in Computer Science(), vol 8930. Springer, Cham. https://doi.org/10.1007/978-3-319-17040-4_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17040-4_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17039-8

  • Online ISBN: 978-3-319-17040-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics