메뉴 건너뛰기




Volumn 367, Issue 1-2, 2006, Pages 203-227

A framework for security analysis of mobile wireless networks

Author keywords

Control flow analysis; Mobile ad hoc networks; Process calculi; Security analysis

Indexed keywords

BROADCASTING; GRAPH THEORY; MOBILE COMPUTING; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33750440529     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2006.08.036     Document Type: Article
Times cited : (120)

References (32)
  • 2
    • 0003092378 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: the spi calculus
    • Abadi M., and Gordon A.D. A calculus for cryptographic protocols: the spi calculus. Inform. and Comput. 148 1 (1999) 1-70
    • (1999) Inform. and Comput. , vol.148 , Issue.1 , pp. 1-70
    • Abadi, M.1    Gordon, A.D.2
  • 3
    • 17144474103 scopus 로고    scopus 로고
    • L. Bettini, V. Bono, R.D. Nicola, G. Ferrari, D. Gorla, M. Loreti, E. Moggi, R. Pugliese, E. Tuosto, B. Venneri, The klaim project: theory and practice, in: Global Computing-Programming Environments, Languages, Security and Analysis of Systems, Lecture Notes in Computer Science, Vol. 2874, Springer, Berlin, 2003.
  • 4
    • 0346263728 scopus 로고    scopus 로고
    • Formal verification of standards for distance vector routing protocols
    • Bhargavan K., Obradovic D., and Gunter C.A. Formal verification of standards for distance vector routing protocols. J. ACM 49 4 (2002) 538-576
    • (2002) J. ACM , vol.49 , Issue.4 , pp. 538-576
    • Bhargavan, K.1    Obradovic, D.2    Gunter, C.A.3
  • 7
    • 17744379731 scopus 로고    scopus 로고
    • A calculus for control flow analysis of security protocols
    • Buchholtz M., Nielson H.R., and Nielson F. A calculus for control flow analysis of security protocols. Internat. J. Inform. Security 2 3-4 (2004) 145-167
    • (2004) Internat. J. Inform. Security , vol.2 , Issue.3-4 , pp. 145-167
    • Buchholtz, M.1    Nielson, H.R.2    Nielson, F.3
  • 10
    • 33750440998 scopus 로고    scopus 로고
    • S. Chiyangwa, M. Kwiatkowska, An analysis of timed properties of AODV, in: Proc. Seventh IFIP Internat. Conf. on Formal Methods for Open Object-based Distributed Systems (FMOODS'05), 2005.
  • 11
    • 33750444142 scopus 로고    scopus 로고
    • C. Ene, T. Muntean, A broadcast-based calculus for communicating systems, in: Sixth Internat. Workshop on Formal Methods for Parallel Programming: Theory and Applications, 2001.
  • 12
    • 0033344295 scopus 로고    scopus 로고
    • F.J.T. Fabrega, J. Herzog, J.D. Guttman, Strand spaces: proving security protocols correct, J. Comput. Security (1999) 191-230.
  • 13
    • 33750442405 scopus 로고    scopus 로고
    • M. Guerrero Zapata, Secure ad hoc on-demand distance vector (SAODV) routing, IETF Internet Draft, 7 February 2006.
  • 14
    • 0036980294 scopus 로고    scopus 로고
    • M. Guerrero Zapata, N. Asokan, Securing ad hoc routing protocols, in: Proc. 2002 ACM Workshop on Wireless Security (WiSe'02), 2002, pp. 1-10.
  • 16
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Imielinski K. (Ed), Kluwer Academic Publishers, Dordrecht
    • Johnson D.B., and Maltz D.A. Dynamic source routing in ad hoc wireless networks. In: Imielinski K. (Ed). Mobile Computing Vol. 353 (1996), Kluwer Academic Publishers, Dordrecht
    • (1996) Mobile Computing , vol.353
    • Johnson, D.B.1    Maltz, D.A.2
  • 17
    • 33750448512 scopus 로고    scopus 로고
    • S. Nanz, Specification and security analysis of mobile ad hoc networks, Ph.D. Thesis, Imperial College London, 2006.
  • 18
    • 33750491497 scopus 로고    scopus 로고
    • S. Nanz, C. Hankin, Static analysis of routing protocols for ad-hoc networks, in: Proc. 2004 ACM SIGPLAN and IFIP WG 1.7 Workshop on Issues in the Theory of Security (WITS'04), 2004, pp. 141-152.
  • 19
    • 29244437139 scopus 로고    scopus 로고
    • S. Nanz, C. Hankin, Formal security analysis for ad-hoc networks, in: Proc. 2004 Workshop on Views on Designing Complex Architectures (VODCA'04), Electronic Notes in Theoretical Computer Science, Vol. 142, 2006, pp. 195-213.
  • 21
    • 21144454095 scopus 로고    scopus 로고
    • F. Nielson, H.R. Nielson, H. Sun, M. Buchholtz, R. Rydhof Hansen, H. Pilegaard, H. Seidl, The succinct solver suite, in: Proc. 10th Internat. Conf. on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'04), Lecture Notes in Computer Science, Vol. 2988, Springer, Berlin, 2003, pp. 251-265.
  • 22
    • 35048839066 scopus 로고    scopus 로고
    • H.R. Nielson, F. Nielson, Flow logic: a multi-paradigmatic approach to static analysis, Essence of Computation: Complexity, Analysis, Transformation (2002) 223-244.
  • 23
    • 35048845165 scopus 로고    scopus 로고
    • H.R. Nielson, F. Nielson, H. Pilegaard, Spatial analysis of bioambients, in: Static Analysis Symposium (SAS'04), Lecture Notes in Computer Science, Vol. 3148, Springer, Berlin, 2004, pp. 69-83.
  • 24
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • Paulson L.C. The inductive approach to verifying cryptographic protocols. J. Comput. Security 6 (1998) 85-128
    • (1998) J. Comput. Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 25
    • 33750489969 scopus 로고    scopus 로고
    • C.E. Perkins, E.M. Belding-Royer, S. Das, Ad hoc on-demand distance vector (AODV) routing, IETF RFC 3561, July 2003.
  • 26
    • 34347349933 scopus 로고    scopus 로고
    • C.E. Perkins, E.M. Royer, Ad-hoc on demand distance vector routing, in: Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'99), 1999.
  • 27
    • 0029535822 scopus 로고
    • A calculus of broadcasting systems
    • Prasad K.V.S. A calculus of broadcasting systems. Sci. Comput. Programming 25 2-3 (1995) 285-327
    • (1995) Sci. Comput. Programming , vol.25 , Issue.2-3 , pp. 285-327
    • Prasad, K.V.S.1
  • 28
    • 33750461506 scopus 로고    scopus 로고
    • P.Y.A. Ryan, S.A. Schneider, The Modelling and Analysis of Security Protocols: The CSP Approach, Addison-Wesley, Reading, 2001.
  • 31
    • 35048830853 scopus 로고    scopus 로고
    • O. Wibling, J. Parrow, A. Pears, Automatized verification of ad hoc routing protocols, in: Proc. 24th IFIP WG 6.1 Internat. Conf. on Formal Techniques for Networked and Distributed Systems (FORTE'04), Lecture Notes in Computer Science, Springer, Berlin, 2004.
  • 32
    • 21144440252 scopus 로고    scopus 로고
    • I. Zakiuddin, M. Goldsmith, P. Whittaker, P. Gardiner, A methodology for model-checking ad hoc networks, in: Model Checking Software: 10th International SPIN Workshop, Lecture Notes in Computer Science, Vol. 2648, Springer, Berlin, 2003, pp. 181-196.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.