dc.contributor |
Graduate Program in Computer Engineering. |
|
dc.contributor.advisor |
Çağlayan, M. Ufuk. |
|
dc.contributor.author |
Önem, Evren. |
|
dc.date.accessioned |
2023-03-16T10:06:28Z |
|
dc.date.available |
2023-03-16T10:06:28Z |
|
dc.date.issued |
2007. |
|
dc.identifier.other |
CMPE 2007 O54 |
|
dc.identifier.uri |
http://digitalarchive.boun.edu.tr/handle/123456789/12511 |
|
dc.description.abstract |
An ad hoc network is a self-configuring network of mobile terminals, connected by wireless links and exhibiting nomadic behavior by freely moving within an area. Computing the routes between the terminals in the ad hoc environment and delivering a guarantee of communication have never been achieved by any protocol in its entirety. In this work, we model an ad hoc network to model-check ARIADNE in order to verify one of its powerful security properties. By a similar approach to Buttyμan’s Active-1-2 attack on ARIADNE, we have used SPIN to flag a sequence of possible events in the protocol leading to a new Active-2-2 attack, where two compromised nodes collaborate to remove all intermediate nodes from the route-discovery process. |
|
dc.format.extent |
30cm. |
|
dc.publisher |
Thesis (M.S.)-Bogazici University. Institute for Graduate Studies in Science and Engineering, 2007. |
|
dc.relation |
Includes appendices. |
|
dc.relation |
Includes appendices. |
|
dc.subject.lcsh |
Wireless communication systems. |
|
dc.subject.lcsh |
Routers (Computer networks) |
|
dc.subject.lcsh |
Computer network protocols. |
|
dc.title |
Formal security analysis of a secure on-demand routing protocol for AD HOC networks using model checking |
|
dc.format.pages |
xiii, 79 leaves; |
|