Formal verification of RGR-SEC, a secured RGR routing for UAANETs using AVISPA, Scyther and Tamarin

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Designing an adaptive routing protocol for Unmanned Aeronautical Ad-hoc Networks (UAANETs) is very challenging. UAANET routing protocols are vulnerable to several attacks and threats. Thus applying security mechanisms is crucial to ensure the authentication, data integrity and confidentiality. Moreover, when applying formal verification methods to analyze protocols, it is necessary to define a model that formalizes their semantics and security requirements. In this paper, we focus on a hybrid routing protocol, called the Reactive-Greedy-Reactive (RGR), which combines the mechanisms of reactive routing and Greedy Geographic Forwarding (GGF). Our main contribution is to enhance the reactive mode of RGR protocol by incorporating three security mechanisms: a node-to-node authentication approach, a keyed-hash message authentication code and an aggregate designated verifier signature scheme. The results of our formal analysis are validated via three automated verification tools (AVISPA, Scyther and Tamarin).

Cite

CITATION STYLE

APA

Mohamadi, H. E., Kara, N., & Lagha, M. (2018). Formal verification of RGR-SEC, a secured RGR routing for UAANETs using AVISPA, Scyther and Tamarin. In Communications in Computer and Information Science (Vol. 878, pp. 3–16). Springer Verlag. https://doi.org/10.1007/978-3-319-94421-0_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free