메뉴 건너뛰기




Volumn 248, Issue , 2007, Pages 95-106

Model checking wireless sensor network security protocols: TinySec + LEAP

Author keywords

Avispa toolbox; Model checking; Security protocols; Wireless sensor

Indexed keywords

FORMAL LANGUAGES; MODEL CHECKING; NETWORK SECURITY; SENSORS;

EID: 37049032133     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-74899-3_9     Document Type: Conference Paper
Times cited : (25)

References (26)
  • 1
  • 4
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Jajodia, S, Atluri, V, Jaeger, T, eds, ACM
    • Ehu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Jajodia, S., Atluri, V., Jaeger, T., eds.: ACM Conference on Computer and Communications Security, ACM (2003) 62-72
    • (2003) ACM Conference on Computer and Communications Security , pp. 62-72
    • Ehu, S.1    Setia, S.2    Jajodia, S.3
  • 5
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • IEEE Computer Society
    • Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, IEEE Computer Society (2003) 197
    • (2003) IEEE Symposium on Security and Privacy , pp. 197
    • Chan, H.1    Perrig, A.2    Song, D.X.3
  • 9
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6 (1998) 53-84
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 10
    • 26444497860 scopus 로고    scopus 로고
    • Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heam, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In Etessami, K., Rajamani, S.K., eds.: CAV. 3576 of Lecture Notes in Computer Science., Springer (2005) 281-285
    • Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heam, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In Etessami, K., Rajamani, S.K., eds.: CAV. Volume 3576 of Lecture Notes in Computer Science., Springer (2005) 281-285
  • 11
    • 33646140557 scopus 로고    scopus 로고
    • Tobarra, M.L., Cazorla, D., Cuartero, F., Diaz, G.: Application of formal methods to the analysis of web services security. In Bravetti, M., Kloul, L., Zavattaro, G., eds.: EPEW/WS-FM. 3670 of Lecture Notes in Computer Science., Springer (2005) 215-229
    • Tobarra, M.L., Cazorla, D., Cuartero, F., Diaz, G.: Application of formal methods to the analysis of web services security. In Bravetti, M., Kloul, L., Zavattaro, G., eds.: EPEW/WS-FM. Volume 3670 of Lecture Notes in Computer Science., Springer (2005) 215-229
  • 12
    • 33745824225 scopus 로고    scopus 로고
    • Backes, M., Modersheim, S., Pfitzmann, B., Vigano, L.: Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. In Aceto, L., Ingólfsdóttir, A., eds.: FoSSaCS. 3921 of Lecture Notes in Computer Science., Springer (2006) 428-445
    • Backes, M., Modersheim, S., Pfitzmann, B., Vigano, L.: Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. In Aceto, L., Ingólfsdóttir, A., eds.: FoSSaCS. Volume 3921 of Lecture Notes in Computer Science., Springer (2006) 428-445
  • 14
    • 33750073187 scopus 로고    scopus 로고
    • A protocol for secure public instant messaging
    • Crescenzo, G.D, Rubin, A, eds, Financial Cryptography. of, Springer
    • Mannan, M., van Oorschot, P.C.: A protocol for secure public instant messaging. In Crescenzo, G.D., Rubin, A., eds.: Financial Cryptography. Volume 4107 of Lecture Notes in Computer Science., Springer (2006) 20-35
    • (2006) Lecture Notes in Computer Science , vol.4107 , pp. 20-35
    • Mannan, M.1    van Oorschot, P.C.2
  • 15
    • 33745787568 scopus 로고    scopus 로고
    • Mitchell, J.C.: Finite-state analysis of security protocols. In Hu, A.J., Vardi, M.Y., eds.: CAV. 1427 of Lecture Notes in Computer Science., Springer (1998) 71-76
    • Mitchell, J.C.: Finite-state analysis of security protocols. In Hu, A.J., Vardi, M.Y., eds.: CAV. Volume 1427 of Lecture Notes in Computer Science., Springer (1998) 71-76
  • 18
    • 22944445210 scopus 로고    scopus 로고
    • Armando, A., Compagna, L.: SATMC: A SAT-based model checker for security protocols. In Alferes, J.J., Leite, J.A., eds.: JELIA. 3229 of Lecture Notes in Computer Science., Springer (2004) 730-733
    • Armando, A., Compagna, L.: SATMC: A SAT-based model checker for security protocols. In Alferes, J.J., Leite, J.A., eds.: JELIA. Volume 3229 of Lecture Notes in Computer Science., Springer (2004) 730-733
  • 21
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61 (2000) 362-399
    • (2000) J. Comput. Syst. Sci , vol.61 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 25
    • 33847120377 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2 (2006) 500-528
    • (2006) ACM Transactions on Sensor Networks , vol.2 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 26
    • 14844304757 scopus 로고    scopus 로고
    • TinyPK: Securing sensor networks with public key technology. In Setia, S
    • eds, SASN, ACM
    • Watro, R.J., Kong, D., Cuti, S.f., Gardiner, C, Lynn, C, Kruus, P.: TinyPK: Securing sensor networks with public key technology. In Setia, S., Swarup, V., eds.: SASN, ACM (2004) 59-64
    • (2004) Swarup, V , pp. 59-64
    • Watro, R.J.1    Kong, D.2    Cuti, S.F.3    Gardiner, C.4    Lynn, C.5    Kruus, P.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.