Distributed monitoring in ad hoc networks: Conformance and security checking

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly configured nodes can severely affect the network as all nodes participate in the routing task. For these reasons, it is important to check the validity of ad hoc protocols, to verify whether the running implementation is conform to its specification and to detect security flows in the network. In this paper, we propose a formal methodology to collect and analyze the network traffic trace. Observers running on a set of nodes collect local traces and send them later to a global observer that correlates them into a global trace thanks to an adapted time synchronization mechanism running in the network. The global trace is then analyzed to study the conformance and the security of the running routing protocol. This analysis is performed using dedicated algorithms that check the collected trace against a set of functional and security properties specified in an adapted formal language. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Mallouli, W., Wehbi, B., & Cavalli, A. (2008). Distributed monitoring in ad hoc networks: Conformance and security checking. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5198 LNCS, pp. 345–356). https://doi.org/10.1007/978-3-540-85209-4_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free