Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols. Andel, T. R. & Yasinsac, A. Electronic Notes in Theoretical Computer Science, 197(2):3–14, February, 2008.
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols [link]Paper  doi  abstract   bibtex   
Secure routing protocols for mobile ad hoc networks provide the required functionality for proper network operation. If the underlying routing protocol cannot be trusted to follow the protocol operations, additional trust layers, such as authentication, cannot be obtained. Threat models drive analysis capabilities, affecting how we evaluate trust. Current attacker threat models limit the results obtained during protocol security analysis over ad hoc routing protocols. Developing a proper threat model to evaluate security properties in mobile ad hoc routing protocols presents a significant challenge. If the attacker strength is too weak, we miss vital security flaws. If the attacker strength is too strong, we cannot identify the minimum required attacker capabilities needed to break the routing protocol. In this paper we present an adaptive threat model to evaluate route discovery attacks against ad hoc routing protocols. Our approach enables us to evaluate trust in the ad hoc routing process and allows us to identify minimum requirements an attacker needs to break a given routing protocol.
@article{andel_adaptive_2008,
	series = {Proceedings of the 3rd {International} {Workshop} on {Security} and {Trust} {Management} ({STM} 2007)},
	title = {Adaptive {Threat} {Modeling} for {Secure} {Ad} {Hoc} {Routing} {Protocols}},
	volume = {197},
	issn = {1571-0661},
	url = {http://www.sciencedirect.com/science/article/pii/S1571066108000522},
	doi = {10.1016/j.entcs.2007.12.013},
	abstract = {Secure routing protocols for mobile ad hoc networks provide the required functionality for proper network operation. If the underlying routing protocol cannot be trusted to follow the protocol operations, additional trust layers, such as authentication, cannot be obtained. Threat models drive analysis capabilities, affecting how we evaluate trust. Current attacker threat models limit the results obtained during protocol security analysis over ad hoc routing protocols. Developing a proper threat model to evaluate security properties in mobile ad hoc routing protocols presents a significant challenge. If the attacker strength is too weak, we miss vital security flaws. If the attacker strength is too strong, we cannot identify the minimum required attacker capabilities needed to break the routing protocol. In this paper we present an adaptive threat model to evaluate route discovery attacks against ad hoc routing protocols. Our approach enables us to evaluate trust in the ad hoc routing process and allows us to identify minimum requirements an attacker needs to break a given routing protocol.},
	number = {2},
	urldate = {2017-11-08},
	journal = {Electronic Notes in Theoretical Computer Science},
	author = {Andel, Todd R. and Yasinsac, Alec},
	month = feb,
	year = {2008},
	keywords = {Mobile ad hoc networks, secure routing, security analysis, threat modeling},
	pages = {3--14},
}

Downloads: 0