A calculus of trustworthy ad hoc networks

11Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

We propose a process calculus for mobile ad hoc networks which relies on an abstract behaviour-based multilevel trust model. The operational semantics of the calculus is given in terms of a labelled transition system, where actions are executed at a certain security level. We define a labelled bisimilarity over networks parameterised on security levels. Our bisimilarity is a congruence and an efficient proof method for an appropriate variant of barbed congruence, a standard contextually-defined program equivalence. Communications in the calculus are safe with respect to the security levels of the involved parties. In particular, we ensure safety despite compromise: compromised nodes cannot affect the rest of the network. A non-interference result is also proved in terms of information flow. Finally, we use our calculus to provide formal descriptions of trust-based versions of both a routing protocol and a leader election protocol for ad hoc networks. © 2011 British Computer Society.

Cite

CITATION STYLE

APA

Merro, M., & Sibilio, E. (2013). A calculus of trustworthy ad hoc networks. Formal Aspects of Computing, 25(5), 801–832. https://doi.org/10.1007/s00165-011-0210-7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free