Wireless Protocol Security: To Simulate or not Simulate
FLORIDA STATE UNIV TALLAHASSEE DEPT OF COMPUTER SCIENCE
Pagination or Media Count:
Secure routing protocols for mobile ad hoc network are vital to proper wireless network operations. Unfortunately, the security properties of these protocols is often unknown and difficult to analyze. There are various techniques available to evaluate security properties, to include coordinated discussion, simulation, experimental observation, analytical proofs, and formal methods. These approaches can only be used to provide operational insight and to analyze routing security weaknesses or vulnerabilities. None of the approaches can prove that a protocol is unconditionally secure, since proving security is an intractable problem. In this paper we discuss the capabilities and limitations of these general approaches for use in evaluating security properties of wireless routing protocols.
- Computer Systems
- Computer Systems Management and Standards