Accession Number:

ADA443031

Title:

Wireless Protocol Security: To Simulate or not Simulate

Descriptive Note:

Corporate Author:

FLORIDA STATE UNIV TALLAHASSEE DEPT OF COMPUTER SCIENCE

Personal Author(s):

Report Date:

2006-01-01

Pagination or Media Count:

8.0

Abstract:

Secure routing protocols for mobile ad hoc network are vital to proper wireless network operations. Unfortunately, the security properties of these protocols is often unknown and difficult to analyze. There are various techniques available to evaluate security properties, to include coordinated discussion, simulation, experimental observation, analytical proofs, and formal methods. These approaches can only be used to provide operational insight and to analyze routing security weaknesses or vulnerabilities. None of the approaches can prove that a protocol is unconditionally secure, since proving security is an intractable problem. In this paper we discuss the capabilities and limitations of these general approaches for use in evaluating security properties of wireless routing protocols.

Subject Categories:

  • Computer Systems
  • Computer Systems Management and Standards

Distribution Statement:

APPROVED FOR PUBLIC RELEASE